Preview

Thesis Chapter 1

Good Essays
Open Document
Open Document
1642 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Thesis Chapter 1
Chapter I
THE PROBLEM & ITS BACKGROUND
Introduction
Ever since the time of technology began, it has helped people compete. From the discovery of the technology, it has been a great aspect in growing society. With lots of technological progress the civilization grows quicker than ever before.
Reality speaking, computers could simplify the life of the people. It helps the nation to do tasks more rapidly such as the communications through social networking sites and be in touch with family and friends with just a click on a button. Computers also play an important role in the school system. It helps students to learn more proficiently and help them do their research work. It also gave people an efficient security through various forms of technology.
Security in all business establishments, academic institutions, and companies are widely used. The protection of one’s data and information should always be maintained. The utilization of biometrics is one of the technologies used to secure one’s identity and individuality. Different system like face recognition, fingerprint analysis, voice recognition and signature verification are some of the examples of biometrics.
Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. (Rouse, 2008)
Biometrics technologies have become the basis of a large group in society for a highly secured identification and personal verification solutions. It is being focused as the authentication method because of the need for consistent security. Business establishments, academic institutions and company are engaged in using the biometrics as a source in monitoring their people’s attendance.
In academic institutions, securities of children are one of the most important

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Good Essays

    However the American National Standards Institute (ANSI) and National Institute for Science (NIST) standards were routinely required for new systems. The Biometric Standards were what elucidated the limitations of demographic based searches. The substituting of data was crucial for standards and Interoperability. All the standards have limits in images and minutiae M-1 is strictly 1:1, the interoperability is based upon images and all major automatic fingerprint identification system (AFIS) venders have deployed complaints with those standards and the venders have all delivered standards complaint images. The standards are not the complete solution for interoperability, automatic fingerprint identification system (AFIS) technology balances on three main areas. The first one is reliability, which is to find the culprit, the automatic fingerprint identification system (AFIS) requirement for this is 95%. The second one is the selectivity of misidentifying, which was set at as requirement of 1%. Finally, filter or penetration rate, this is how much of the data is search biometrically, automatic fingerprint identification system (AFIS) was 2% of this fingerprint database. With these three criteria’s, a system performance was measured in speed, accuracy, transaction volume and flexibility. The systems performance requirements evolve so the system must adopt to that evolution and the…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Answer: Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. Biometric authentication provides strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive. Biometric authentication is in the early stages of adoption. Because of its strength, it likely will see increased usage in the future. It is also likely that legislators will pass laws governing the use, storage, and protection requirements for biometric data.…

    • 4641 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Biometrics is a science. It is a science that measures individuals¡¦ physical characteristic properties that are unique. With world changing of every second of everyday; human beings is still the cause of security breaching. On just about every website you need a password or pin number. Passwords and ID cards have been used to control access to restricted systems. However, security can be easily breached in these systems when a password is disclosed to an unauthorized user or a card is stolen by an impostor. We as humans forget password and pin numbers because we have so much to protect and access. Furthermore, simple passwords are easy to guess and difficult passwords may be hard to remember. The coming out of biometrics has addressed the problems that occur in traditional verification methods. Biometrics in this case would be best. With biometrics it¡¦s uniqueness of physical characteristics can never be lost, stolen, shared or forgotten.…

    • 2060 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Biometric Marketing

    • 409 Words
    • 2 Pages

    With the growing concern of online theft and security leaks, Biometric systems could be just the concept to fill the uncertainty knowledge gap. Online companies have been for long trying to narrow this uncertainty gap for online consumers by applying several tracking methods during web site visits, including the use of smart cards, tokens, credit cards and digital certificates, to provide the means to correlate a consumer with an online system. But all suffer from uncertainties and lack of reliability in achieving accurate identification. For example, because a biometric sensor will never capture the exact same data twice, the matching of biometric features requires additional fuzzy logic comparison. This requirement will help in acquiring accurate data on market research. The companies with the help of this data will be in a better position to align its IT and…

    • 409 Words
    • 2 Pages
    Good Essays
  • Good Essays

    SSRN id2512567

    • 13967 Words
    • 62 Pages

    Chandra, A., and T. G. Calderon. 2003. Toward a biometric security layer in accounting systems.…

    • 13967 Words
    • 62 Pages
    Good Essays
  • Better Essays

    Biometric is a tool used to identify and reliably confirm an individual’s identity on the basis of physiological or behavioral characteristic (combination of both) which are unique for a specific human being. Biometric technology has been around for so many years and the technology has being used as the latest weapon to fight against crime. The scope of this paper is reflecting on biometric in terms of ethical and privacy issues. There are a number of ethical issues centering on biometric concerning privacy rights of individuals. Examples of biometric technology are fingerprints, facial recognition, DNA, palm print recognition, hand geometry, iris recognition, odor recognition and etc. These devices are being used more and more around the world each day. Some examples are: places like airports, Walt Disney, office buildings, banks, military, government facilities and the list goes on and on as we rely on this technology to help identify us for our security. This technology has been used in many ways to protect our personal identity. In fact biometric is tightly linked to an individual and it is difficult to duplicate a biometric trait, it can prevent identity theft and rule out the use of several identities by a single individual, however one concern is about the stored biometric data.…

    • 1023 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Biometrics are a growing technology that will most likely be seen applied to network security in the near future. Three options are discussed in this paper; keystroke dynamics, fingerprinting, and iris scanning. Each option has its strengths and weaknesses but none of them are a standalone solution to access a network. Should any of these solutions be applied they would need to be combined with password or token security measures that are currently in place.…

    • 1656 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Biometrics

    • 2828 Words
    • 12 Pages

    A PAPER ON Biometrics Submitted By MR. TAPSE PRAVINKUMAR NARSING T.E.(ENTC) Email:- tapse_pravinkumar@rediffmail.com & MR.…

    • 2828 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    biometrics

    • 2387 Words
    • 9 Pages

    .[6] Jain, A.K.; Bolle, R.; Pankanti, S., eds. (1999). Biometrics: Personal Identification in Networked Society. Kluwer Academic Publications. ISBN 978-0-7923-8345-1.…

    • 2387 Words
    • 9 Pages
    Powerful Essays