Biometrics Essay

2735 words - 11 pages

Jacob Delgado CSYS 3350 ?BIOMETRICS? Delgado 1 Recent technological advances in the computer industry are opening up a brave new world of convenience and security. Once regarded to realms of fantasy, such as the late 60?s show Star Trek, where the ship?s computer would easily respond to Captain James T. Kirk?s voice commands, this technology will soon be viable and affordable. Biometrics is the measurement of living traits, whether physical or behavioral. Biometrics, by definition, is not a new technology. However, the computer industry has advanced it severely. Some of the traits that biometrics can measure with today?s technological advances are Hand, Retina, Iris, Facial, Voice, and Finger scan. This paper will allow you to learn what each biometric device is used for and it?s current implication amongst financial institutions, the business community, chemical industries, automobile manufacturers, government agencies, internet access, and allows you to see some of the current problems associated with biometrics.The following are brief information and description on what each biometric device measures: ? Hand Scan uses hand geometry, which is not distinct enough to identify random people. There have been six different hand-scanning products developed over the span of two decades, including the most commercially successful biometric to date, the ID-3D Handkey from Recognition Systems. The Handkey, of which nearly 4,000 were sold in 1995, looks at both the top and side views of the hand using a built-in video camera and compression algorithms. The reference template is less than 10 bytes, the smallest in the industry. Dirt and cuts do not detract from Delgado 2 performance, and the hand can be guided easily into the correct position for scanning.? The Retina Scan is accurate, but invasive. The retina scan involves a beam of light that allows the computer scanner to access the blood vessel pattern on the back of the eye, which provides a unique base for identification. It requires the user to stand at a designated point and stare at a designated target and ideal conditions.? The Iris Scan is also extremely accurate. The technique's major advantage over retina scanning is that it does not require the user to focus on a target, because the iris pattern is on the eye's surface. In fact, the video image of an eye can, theoretically, be taken from several feet away, and the user does not have to interact actively with the device. The iris pattern is reflected back to a camera, which captures the unique pattern and represents it using less than 35 bytes of information. The toughest hurdle for these technologies continues to be user acceptance.? Facial Scans can scan and identify people in a crowd without their cooperation or knowledge. The allure of facial recognition is obvious. It is the method, which most resembles the human trait of the memory used to recognize the identity of people. Facial image can be captured from several meters away using...

Find Another Essay On Biometrics

Biometrics and Ethics Essay

1466 words - 6 pages ). I have taken up the research topic Biometrics and Ethics and would like to analyze how Biometric has become part of our everyday life and with it what are the ethical challenges human race faces. Biometrics is the statistical measure of biological beings; it is a system which is used in identifying a person by verifying a physical characteristic or attribute. The reason for its existence is to provide a single computer system login that can

biometrics and access control Essay

1356 words - 6 pages Software companies are faced with external security threats from hackers and others, along with a variety of even more threatening internal security threats, like corporate spies. This has resulted in companies being more vigilant thus implementing necessary precautions to prevent unauthorized access to the pool of data within the company. These precautions include access management (access control) as well as access technology (biometrics

Research Paper-Biometrics

2048 words - 8 pages Research Paper-Biometrics “Biometric technologies are defined as "automated methods of identifying or authenticating the identity of a living person based on a physical or behavioral characteristic."(Source #1) Growing up I loved to watch McGyver. He use to run around and break in and out of military compounds that were equipped with all types of security systems. Somehow he would always find the laser beams, or trick the fingerprint

Biometrics in security

1213 words - 5 pages again. One of the most recent and secure ways to protect information is through the use of biometrics: which compares a user’s biometric data against the data stored in the system.5 The biometric system is designed to use the following four modules: 1. Sensor Module. The sensor module captures the biometric data from an individual. 2. Feature Extraction Module. The feature extraction module processes the biometric data to extract a feature set, or

Biometrics: Iris Recognition

1236 words - 5 pages geometry, face, iris, ear shape, and retina vein) and behavioral characteristics (e.g. gait, voice, signature and keystroke dynamics) to provide automatic identification of individuals based on their inherent physical and /or behavioral characteristics. Among these biometrics, iris recognition is one of the most accurate and reliable biometric for identification because of following characteristics (i) Iris pattern has complex and distinctive

Biometrics: Are we the key?

3032 words - 12 pages TABLE OF CONTENTSBIOMETRICS 21. INTRODUCTION 21.1. Biometrics Background 21.2. History of Biometrics 21.3. Areas of Research 22. RESEARCH INFORMATION 42.1. Biometric Methods Used 42.2. Areas of Implementation 52.3. Future Advances 62.4. Negative Aspects 72.5. Positive Aspects 73. CONCLUSION 84. REFERENCES 95. BIBLIOGRAPHY 10Websites 10Books 10Other sources 116. APPENDIX 1 12BIOMETRICS1. INTRODUCTION1.1. Biometrics BackgroundBiometrics comes from

The Identification Technology of Biometrics

701 words - 3 pages The recent advances of information technologies and the increasing requirements for security proposed have led to a rapid development of automatic personal identification systems based on biometrics. Biometrics refers to identify an individual based on his or her distinctive physiological (e.g., fingerprints, face, retina, iris) or behavioral (e.g., gait, signature) characteristics accurately [1]. It is inherently more reliable and more capable

Biometrics, Security and Wrinkled Fingerprints

861 words - 4 pages . Euclidean distance vector will be the third and the improved fingerprint characterization. CONCLUSION It can be concluded that while considering applications for security, biometrics is one of traditional and effective method for verification purpose. Out of various biometrics, fingerprint is most frequently as well as commonly used. But some pitfalls in fingerprint recognition system are required to be covered. Various fingerprint matching

Biometrics Introduction to Information Systems Security

622 words - 2 pages Biometrics is used in many places and there is a bright future for them. Finger print scanners are being used in many states of the US. They have been used to trace social welfare fraud. An iris pattern identification system is being used in Cook County, Illinois to ensure that right people are released from jail. ATM machines have been installed with finger scanners to prevent theft and fraud in Indiana (Jain, 2005).New biometric technologies

Cryptographic Key Generation Using Cancellable Biometrics

1649 words - 7 pages 4.1 CRYPTOGRAPHIC KEY GENERATION USING CANCELLABLE BIOMETRICS Using cancellable biometrics we propose an efficient approach for the generation of a cryptographic key from fingerprint biometrics. This approach takes fingerprint as input and extracts the minutiae points from the preprocessed fingerprint image. We obtain the preprocessed fingerprint image by using processes such as histogram equalization and weiner filtering. Subsequently, a

Security and Privacy on SAT´s (IRS) Electronic Signature

2298 words - 9 pages signed with the electronic signature, legally, is as good as a document signed by hand. Also, another characteristic is that it uses biometrics recognition. It is a powerful tool, that when misused, can cause a lot of trouble. Naturally a couple questions come to mind: How safe is to use the electronic signature? Is my privacy kept? Privacy, security and biometrics There are two main fields of study regarding the use of electronic signature. The

Similar Essays

Biometrics Essay

1515 words - 6 pages Biometrics We live in a world today, in which technology moves at a very rapid pace. Many of these technological advances can be used to make our everyday lives easier and safer. One of these new technologies is Biometrics. Biometrics is the process of measuring a person’s physical properties. This would include measuring things like fingerprints, retinas, odor, vein structure on the back of the hand and many other things. Biometrics is

Biometrics Essay

1520 words - 6 pages Biometrics is used in many places and there is a bright future for them. Coca Cola has recently replaced time card system with hand scanning machines. Finger print scanners are being used in many states of the US. They have been used to trace social welfare fraud. An iris pattern identification system is being used in Cook County, Illinois to ensure that right people are released from jail. ATM machines have been installed with finger scanners

Evolving Biometrics Essay

2891 words - 12 pages Evolving Biometrics The terms biometrics and biometry have been used since the early 20th century. It refers “to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences” (Biometrics Journal.) Biometrics has been used in a variety of disciplines, in which it serves a different function for each field. For example it has been used statistically in agricultural field

Biometrics Security Essay

1400 words - 6 pages Biometrics Security Biometrics uses personal characteristics to identify users. When it comes to security, mapping unique patterns and traits in fingerprints, irises or voices is considered light years ahead of forcing employees to memorize combination of letters and numbers -- which are easily compromised and easily forgotten. The technology works by taking measurements -- whether it is the weight and length of bones in the hand or the