Preview

The Biometric System

Powerful Essays
Open Document
Open Document
5133 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Biometric System
Biometrics System
The use of special input devices to analyze some physical parameter assumed to be unique to an individual, in order to confirm their identity as part of an authentication procedure.
Examples include fingerprint scanning, iris recognition, facial recognition, voice recognition (speaker recognition), signature, vascular pattern recognition.
(http://www.findbiometrics.com/Pages/guide2.html).
1-Introduction to Biometrics and Biometrics Security System
A brief background of biometric and biometric security systems will provide a greater understanding of the concept of network security. Biometrics is defined as the unique (personal) physical/logical characteristics or traits of human body [Jain, 2004]. These characteristics and traits are used to identify each human. Any details of the human body which differs from one human to other will be used as unique biometric data to serve as that person 's unique identification (ID), such as: retinal, iris, fingerprint, palm print and DNA. Biometric systems will collect and store this data in order to use it for verifying personal identity. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometrics is the key to open that lock [Jain, 2006].

There are seven basic criteria for biometric security system:



References: [Jain, 2006]Jain, A.K.; Ross, A.; Pankanti, S., "Biometrics: a tool for information security" Volume: 1 Issue: 2, Issue Date: June 2006, page(s): 125 - 143 [Maestre, 2009] Sandra Maestre, Sean Nichols "DNA Biometrics", 2009 [Reid, 2011] Paul Reid, "Biometrics for network security", Pearson Education Inc., 2004, ISBN 0131015494 [Schuckers, 2001] Michael E [Mosdorf, 2006] Khalid Saeed-Jerzy Pejas-Romuald Mosdorf, "Biometrics, Computer Security, Systems and Artificial Intelligent Applications", S pringer-Verlag Berlin Heidelberg 2006, ISBN 0387362320 [Woodward, 2001]John D [Wikipedia - data metrics] http://en.wikipedia.org/wiki/Data_Matrix [PBworks 2006] PBworks, "Advantages and Disadvantages of technologies", 2006 http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies [Arc Aspicio, 2009] Arc Aspicio "DNA: The last biometric" 2009 http://www.arcaspicio.com/insights/2009/3/19/dna-the-last-biometric.html [Lazaroff, 2004] Mr Last Modified on: November 28, 2011 This and other papers on latest advances in network security are available on line at http://www.cse.wustl.edu/~jain/cse571-11/index.html

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    IAFIS is the largest biometric database in the world. This system houses on average more than 70 million criminal files of subject along and around 34 million if not more civil prints. This system has more than 73,000 known terrorist that are suspected terrorist crimes against the United States. ("The fbi: Federal,2008”).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric element, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristics code, the computer grants access. Example of biometric devices include fingerprint readers and face recognition systems.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This system alone has improved the speed and exactness of the very popular 10 point process of prints. A fingerprint sent by graphic conduction from a crime scene to another place within a state can be processed instantly. This then allows officials to issue all point bulletins with in ample time of a crime being committed. This kind of technology opens up communication with the population to catch a criminal fast and proficiently.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    However the American National Standards Institute (ANSI) and National Institute for Science (NIST) standards were routinely required for new systems. The Biometric Standards were what elucidated the limitations of demographic based searches. The substituting of data was crucial for standards and Interoperability. All the standards have limits in images and minutiae M-1 is strictly 1:1, the interoperability is based upon images and all major automatic fingerprint identification system (AFIS) venders have deployed complaints with those standards and the venders have all delivered standards complaint images. The standards are not the complete solution for interoperability, automatic fingerprint identification system (AFIS) technology balances on three main areas. The first one is reliability, which is to find the culprit, the automatic fingerprint identification system (AFIS) requirement for this is 95%. The second one is the selectivity of misidentifying, which was set at as requirement of 1%. Finally, filter or penetration rate, this is how much of the data is search biometrically, automatic fingerprint identification system (AFIS) was 2% of this fingerprint database. With these three criteria’s, a system performance was measured in speed, accuracy, transaction volume and flexibility. The systems performance requirements evolve so the system must adopt to that evolution and the…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    A biometric security device used in high security areas is an iris recognition system. Iris recognition systems read patterns in the iris of the eye. These patterns are as unique as a fingerprint. Iris recognition systems are quite expensive and are used by government security organizations, the military, and financial institutions that deal with highly sensitive data (Doe).…

    • 264 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This is a bit more new invention and not a lot of organisations are using it as it is very expensive security measure. Biometric scanners are used to scan people’s face, fingerprints, iris, hand geometry vein or voice as every single person has it different. The most famous and used identification is through fingerprints as it is easy to check. The scanner will take a picture of one of your fingers and then it will be saved and used in a binary code. Furthermore, the algorithm is assigned to one person so if the same person’s is scanned once more, the system will match it straight with the previous binary code and this is enabling recognition.…

    • 1153 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometric Marketing

    • 409 Words
    • 2 Pages

    With the growing concern of online theft and security leaks, Biometric systems could be just the concept to fill the uncertainty knowledge gap. Online companies have been for long trying to narrow this uncertainty gap for online consumers by applying several tracking methods during web site visits, including the use of smart cards, tokens, credit cards and digital certificates, to provide the means to correlate a consumer with an online system. But all suffer from uncertainties and lack of reliability in achieving accurate identification. For example, because a biometric sensor will never capture the exact same data twice, the matching of biometric features requires additional fuzzy logic comparison. This requirement will help in acquiring accurate data on market research. The companies with the help of this data will be in a better position to align its IT and…

    • 409 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Murder is regarded as a crime in all modern civilized societies. Crime is shown in the media and is prevalent in society. Early in America s history, killing a human being was a relatively private matter to be dealt with by families or larger kinship groups. Deliberate killing (such as infanticide, cannibalism, head hunting, or the killing of the very old) is classified as murder in modern law, but such practices were viewed as customary and acceptable early in America s history when the settlers first arrived on the continent.…

    • 2208 Words
    • 9 Pages
    Powerful Essays

Related Topics