Preview

Biometrics Term Paper

Good Essays
Open Document
Open Document
733 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometrics Term Paper
Biometrics

Meredith Thomas

Strayer University

1

Biometrics, according to Foster, “is the science of using technology to automatically identify an individual based on physical, biological, and behavioral characteristics.” There are two classification systems in biometrics and they are: physiological and behavioral. Physiological characteristics pertain to fingerprints, facial recognition, DNA, hand geometry, the shape of your body, iris recognition, etc. Behavioral characteristics pertain to voice recognition, handwriting, the way that you walk, etc. There are also two categories for the use of this biometric information and they are: access control, and remote identification. Access control pertains to the prevention of others from gaining access to information. Remote identification helps to identify a person through fingerprints or hand geometry. According to globalsecurity.org (2000-2010) they have given biometric technologies the following characteristics: Universality: Every person should have the characteristic. People who are mute or without fingerprints will need to be accommodated in some way. Uniqueness: Generally, no two people have identical characteristics. However, identical twins are hard to distinguish. Permanence: The characteristics should not vary with time. A person’s face, for example, may change with age. Collectability: The characteristics must be easily collectible and measurable. Performance: The method must deliver accurate results under varied environmental circumstances. Acceptability: The general public must accept the sample collection routines. Nonintrusive

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cap Sda

    • 289 Words
    • 2 Pages

    The Flight Commander has no suspense’s of his or her own, but manage his or her staff suspense’s. They must monitor the Flight Sergeant, as well as the Element Leaders to make sure that they are performing their duties. This information must be then reported to the Cadet Commander, as per the Squadron Chain of Command.…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    They are the small differences that appear in any repeated samples of a person’s handwriting. When your write something it's not always the same so that gives an examiner something to look at.…

    • 679 Words
    • 2 Pages
    Good Essays
  • Good Essays

    his point on how important handwriting used to be and how the relevance of it should remain the…

    • 779 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Shoe Horn Sonata

    • 1155 Words
    • 5 Pages

    HOW DOES THE USE OF THE DISTINCTIVELY VISUAL EMPHASIE THE WAYS THAT INDIVIDUALS RESPOND TO SIGNIFICANT ASPECTS OF LIFE?…

    • 1155 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Run Lola Run

    • 357 Words
    • 1 Page

    In hat way does the distinctively visual influence your understanding of people and the events within texts?…

    • 357 Words
    • 1 Page
    Good Essays
  • Good Essays

    1. What is the composition of latent print residue and how does it affect the viability of latent prints.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Recognising routines of the day (e.g. becoming excited when they hear the bath water or have a bib put on).…

    • 2142 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    “Stop and Frisk” is a program put into effect by the New York Police Department that basically grants an officer authority to stop and search a “suspicious character” if they deem him/her to be as such. They don’t need a warrant, or see you commit a crime. 5They simply need to deem you “suspicious” to violate your 4th amendment rights without repercussions. Since its inception, New York City’s stop and frisk program has drawn much controversy stemming from the disproportionate rate of arrest. While the argument that the program violates an individual’s 4th amendment right of protection from unreasonable search and seizure could absolutely be made, that argument pales in comparison to the argument of discrimination. A disproportionate number of African Americans and Hispanics are unreasonably stopped and searched simply for looking suspicious. The original intention of this program was to reduce the level of crime (which it has) and to crack down on illegal weapons. It has now become an excuse for police to play with their authority and target innocent people.…

    • 1516 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Using a marker pen to cross over any information that may lead to my setting or individual being recognised.…

    • 2062 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Gazes at faces and copies facial movements. e.g. sticking out tongue, opening mouth and widening eyes.…

    • 1063 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Scaling can be used to create a graphic representation of missing children faces taking into consideration development and maturity of the individual after several years. In the enotes.com article, “What is facial recognition technology and how does it work?” since the 1990’s facial recognition technology has been used to identify criminals and missing children. The technology uses a previous picture of an individual’s face. Measurements such as the person’s nose width, length of their forehead, and width of the lips are digitally stored and the data is used to identify a person; this process is known as geometrical recognition. An alternative process called photometric recognition, generates an outline of the facial features and uses the data for identifications. Data extracted from a picture can be scaled and be compared to other pictures in a database. The technology can be used to progress a child’s picture to an image the child would look like as he or she ages. For instance, if a child went missing at age five, this technology can use be used to…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ability to recognise signs of harm, abuse or neglect and respond to them appropriately to improve…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fingerprint debate

    • 943 Words
    • 4 Pages

    The value of fingerprinting and background checks is to make sure that the students are being protected. It is extremely important that for the safety of the students as well as the other teachers the school must do thorough background and fingerprinting checks. In doing background and fingerprinting checks you can tell the employer with pieces of information about the teachers background’s that can share credit reports, social Security number, criminal records, driving records, and education licenses. Every state has different rules involving the different charges that are placed on the teacher and how to handle them. The question that is asked frequently is, “What is the value of fingerprinting and background checks versus invasion of someone’s privacy?”…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Digital Forensics Paper

    • 1176 Words
    • 5 Pages

    Digital forensics is not a new phenomenon, therefore, why is it, still to this day, not considered a profession. As mentioned in the article, digital forensics has been around since the 1970s when the government first began to develop tools to investigate web based fraud (Losavio, Seigfried-Spellar, and Sloan, 2016). Social scientists have claimed that due to the progression digital forensics has received, such as, specialized knowledge; specialized training; work that is considered great value; credit emptor relations with clients; a code of ethics; cooperative relations with other members; high autonomy levels; and self regulation, since its original inception, that it is indeed a profession (Losavio, Seigfried-Spellar, and Sloan, 2016).…

    • 1176 Words
    • 5 Pages
    Good Essays
  • Good Essays

    difficult to associate biometrics with a given individual. So individual are not able to recognize own earmark. For this reason the earmark databases can not have to be as much secured as the face databases, in that the risk of attacks is much lower.…

    • 114 Words
    • 1 Page
    Good Essays

Related Topics