THE PROBLEM AND ITS SETTING
This chapter comprises the introduction, background of the study, objectives of the study and scopes and limitations of the study.
INTRODUCTION
From Wikipedia (2012) definition, human retina is a thin tissue composed of neural cells that is located in the latter portion of the eye. Although retinal patterns may be changed in cases of diabetes, glaucoma or retinal degenerative disorders, the retina typically remains unchanged from birth until death. Due to its unique and unchanging nature, the retina appears to be the most precise and reliable biometric. Also, from the same source, retinal’s scan, commonly confused with the more appropriate named “iris scanner”, is a biometric technique that uses the unique patterns on a person’s retina to identify an individual. A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a person’s eye as they look through the scanner’s eyepiece. This beam of light traces a standardized path on the retina. Because retinal blood vessels are more absorbent of this light than the rest of the eye, the amount of reflection varies during the scan. The pattern of variations is converted to computer code stored in a database. According to the article made by Professor Dan Boneh (2012), computer security is a branch of computer technology known as information security as applied to computers and computer networks. The objective of computer security includes protection of information and property from others.
BACKGROUND OF THE STUDY
Based on the latest article made by Paul Rubens (2012), he clearly emphasized that passwords are potentially the weakest link in an organization’s information security systems. Biometric authentication technologies promise a more secure alternative (See Appendix A). Not to be confused with the two ocular-based technologies, which are iris and retina scanning, the different is that iris recognition uses camera