Introduction
Sareen (2014) describes biometrics as the technology or the science that determines and assesses biological data. Biometrics is measurable behavioral and physiological characteristics applicable in the verification process of people’s identity (Sareen, 2014). In layman terms biometrics may be understood as a science that involves measuring behavioral and physical characteristics unique to an individual (Xiao, 2007). Biometrics verifies that any person is who they claim to be. The term biometrics refers to life measurements although the terms have been associated with the unique physiological qualities used in identifying a person. Biometric applications are often associated with security. However, the identification of the unique human characteristics scientifically has broader meaning and relevance bearing in mind that computer interface has become increasingly natural (Sareen, 2014).
Jaiswal (2011) describes biometric as any robust, measurable, physical, and distinctive personal traits or characteristic of individuals usable in their identification or verification of their claimed identities. There are two categories of biometrics as described by Sareen (2014) i.e. physical and behavioral biometrics. Behavioral biometrics can be defined as a biometric that evaluates naturally acquired characteristics over some time. Behavioral biometrics is used for verification purposes (Jaiswal, 2011). Physical biometric is used for the measurement of intrinsic physical traits of individuals and can be employed for verification and identification (Xiao, 2007).
How Biometrics Work
Notwithstanding the scheme of use of any biometric, all of them have to be processed in the same way. The biometric capturing process involves capturing, processing, and finally comparison. In capturing, the biometric scheme is utilized in the capturing of physiological and behavioral features (Jaiswal, 2011). In processing, the captured behavioral or physical features are processed in order to derive the unique identifiers that correspond to the individual person alone. In comparison, the individual will then be enrolled into the system as the user who is authorized. In the comparison process, the captured image will be checked against the current unique identifying elements. The newly captured elements are the detailed used for authorizing the user. Upon completion of the entire journey of biometric capturing, processing, comparison, the stored data is then applied for future comparison (Jaiswal, 2011).
Having knowledge of the person with whom a conversation is being undertaken is fundamental in the process of human interaction. Computers are expected to integrate these capabilities in future. There are several biometric traits that have been cultivated and employed for the authentication of the identity of people. The concept is to use people’s special characteristics for their identification. By the employment of the special characteristics, it means application of features such as their signature, fingerprint, iris, and face (Sareen, 2014).
Characteristics of Biometric
There are several biometric characteristics that could be captured during the first processing phase. In order to make automated biometric capture and automated biometric comparison with data previously stored possible the stored biometric characteristics must satisfy the following conditions (Sareen, 2014).
· Universal: Every individual has to possess the said attribute. This attribute has to be one that can rarely become lost to disease or accident and has to be universal to all.
· Invariance of characteristics: The biometrics must be constant for an extended duration of time. These biometric traits must never be...…against the template that defines the user from the database. The template is pointed to by the username, token or password. This verification process is referred to as 1:1 (one to one) (Jaiswal, 2011). The device might find or fail to find the matching data from the database. Generally there are three approaches used in the recognition of an individual for the purpose of security otherwise referred to as authentication (Jaiswal, Bhadauria & Jadon, 2011). The approaches are listed from the least secure and least convenient approach to the most secure and most convenient approaches. The first and least secure approach uses something on the individual like the token, key, or card. The 2nd approach utilizes something that the individual is aware of like a pin or password. The third verification process uses something the individual is, and that is a biometric (Jaiswal, Bhadauria & Jadon, 2011).
Conclusion
A combination of the three recognition processes will add to the security layers and requiring the three recognition processes offers better security standards (Jain, Ross & Prabhakar, 2004). Authentication of biometrics is an automated identification method or the verification of living person’s identity in the present based on their personal traits or physical characteristics. Living person in real time is a phrase used in the differentiation of biometric authentication and forensics. Forensics doesn’t require identification of living individuals in real time unlike biometrics (Jaiswal, 2011). The biometrics technology is highly applicable in immigration, healthcare, financial services, social services, control of physical access, network access, telecommunication, law enforcement etc. Biometrics can be used a deterrent to criminal activities and terrorism as…
Some Key applications are:Physical Acces facility and secure-area access, time-and-attendance monitoring. Growth: Flat, starting at 13% of total market revenues and ending at 14%. Logical Access: PC, networks, mobile devices, kiosks, accounts. Growth: From 21% to 31% of total market revenues. Identity Services: Background check enrollment, credentialing, document issuance. Growth: Decline from 65% to 47% of total market revenues. Surveillance and Monitoring: Time and attendance, watchlists. Growth: From less
In addition to the stability, scalability and extensibility of its architecture, cloud platform have made it possible for workflows across government to become more pervasive and secure as a result [4]. The TCO of a given cloud platform or series of applications therefore has continued to become reduced by the experience effect (comparable to economies of scale yet only applied to data aggregated and knowledge creation) across government [6]. This
Security Technology in Next Five Years Globally security concerns have placed great pressure on the survival of human life and had threatened the daily life, confidence and dignity of societies at large. To resolve the security concerns and overcome with this disastrous obstacles, security technological advancements have been made in many facets. Human life is playing its vital role in moving the world to a secure place where families, businesses,
However, cursory studies that have been conducted are either biased because they seem to present a biased review of certain products or are insufficient because of their limitations and shallowness. Those studies that have been considered to be useful are mentioned below. Robert D. Boerner, Joanne Bourquard, Pam Greenberg (2000) comprehensively elaborates the legal aspect of spam. He provides an in-depth review of the present laws in actions and the
The truth of the matter is the biometric templates for identity enrolment that are stored on a server are not in the real since images rather they are mathematical representations of the data points that the biometric algorithm is able to extract from the scanned fingerprint, finger vein, palm vein or iris. The identifying template is a binary file that has a series of zeros and ones. The algorithm then
attack of 911 has posed a serious threat to the aviation industry. For the first the world could realize that airplanes are not only the mode of transportation but can also be utilized as potential bombs. Many passengers are apprehensive of air travel. This led Governments, Policy Makers, aviation industries and regulatory authorities to think a while about aviation security. The aviation security is being revolutionized since then to
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now