Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The history of computer development
The history of computer development
Biometric security technology
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The history of computer development
In the world of computer science, advancements in many fields have been made. One field in particular is very interesting. The field is that of Biometrics. A field that essentially coincided with the growth of modern day computer science. Biometrics is essentially identifying human beings by their characteristics.
Biometrics is defined as a process or to describe a characteristic as it is a general term. In regards of the characteristic portion of the definition, it is a measurable behavioral, physiological and anatomical characteristic that can be used for automated recognition. In regards of Biometrics as a process, it’s an automated way of identifying someone using their measurable behavioral, physiological and anatomical characteristics.
This translates to computer science by having the system using said characteristics to access, control and/or identify. There are many ways of collecting, storing, interpreting and utilizing this data. These biometric systems, because of their usefulness in the realm of security and privacy, are used by various people in many places all over the world. The realm of biometrics, however, have many variables that make it much deeper.
The exact characteristics of biometrics are separated into two groups. One group is known as the physiological group. This group consists of the palm, fingerprint and iris recognition as well as hand geometry, DNA and scent but is not limited to these options. The other group is known as the behavioral group and is associated with the traits of a person’s natural behavior. These traits include gait analysis, rhythm of typing, voice patterns, etc. This information is scanned and stored for later use. That very same information can be accessed later. This is used m...
... middle of paper ...
...ccuracy of your biometric system, stability, cost and its typical applications. Variables such as those can severely limit one’s choices on which system would be best. The field of biometrics is expanding every day, so some options may be more viable in the future.
Biometrics has much room for improvement in the future. As computer systems and technology evolve, so will biometric systems.
In conclusion, Biometrics is an extremely fascinating field. A field that is characterized by its highly technical ability of securing, recording and accessing systems and installations. It is even the prime choice for places that hold extremely sensitive information such as the FBI and various hospitals. It has even reached the general populace as a medium to use to access personal information and places. It is truly the wave of the future in the world of security technology.
Biometrics-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security (Campbell, 1995). Utilized alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily lives (Campbell, 1995). Among the features measured are; face, fingerprints, hand geometry, iris, and voice (Campbell, 1995).
(f) Spoof attacks and Template security: Spoof attack refers to the deliberate attempt to manipulate one’s biometric template in order to avoid recognition, or generate biometric artifacts in order to take someone’s identity. And still biometric systems are susceptible to attacked in a number of ways (Ratha et al., 2001). For example, a fingerprint recognition system can be circumvented by using fake or spoof fingers (Nandakumar et al., 2007, Nandakumar et al., 2007a). Behavioral traits like voice (Eriksson et al., 1997) and signature (Harrison et al., 1981) are more susceptible to such attacks than physiological traits. Security of biometric templates is also another critical issues in biometric systems. The stolen biometric template can be used to gain unauthorized access to the system (Adler, 2003, Cappelli et al., 2007, Ross et al., 2007).
It is easy to think of biometrics as the future science technology are always happened in some fictions, associated with solar car and clones together. In fact, it has long history that people understood the basic principle and application of the biometric. Thousands of years ago, the people of the Nile basin used the biometric in everyday transactions (such as scarring, skin tone, eye color, height, etc.) for identification. Of course, they had no any automatic electronic identification system, or computer network, but the principle is similar.
Step One is the ten-print processing which was started in 2011. Using algorithms from Morphotrak NGI will be able to do back-end processing of the ten-print finger...
Law enforcement uses several methods to solve all types of crimes. Having a variety of ways to help solve an investigation gives officials an advantage. If one method fails or isn’t helpful, there are several others they can rely on. For instance, if there are no physical witnesses to a crime, the criminal may have left a fingerprint at the crime scene. An individual’s fingerprint is unique, “no two persons have exactly the same arrangement of ridge patterns” (“Fingerprint ID”). Fingerprints of criminals and of civilians are collected and stored. Also, “People who apply for government jobs, jobs that handle confidential information, banking jobs, teaching jobs, law enforcement jobs, and any job that involves security issues can be fingerprinted” (“The First ID”). Fingerprints are processed within hours and minutes through the Integrated Automated Fingerprint ID System. This system was developed in 1991, and made it easier for different law enforcement agencies to store and share fingerprints.
Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.
When Maxwell Smart first whipped out his shoe phone in 1965, everyone saw an act of pure movie magic. Back in the mid to late 1900s everybody had the same idea of the future. Everyone pictured the future as talking robots (Siri), computerized pocket-sized dictionaries (smart-phones), hovering devices (drones), and much more. Today, everyone thinks of these technologies as commonalities. Most of these current devices have a valuable impact, while few create debatable issues. The company NGI has a system that will revolutionize the field of biometric facial recognition. In the article titled Embracing Big Brother: How Facial Recognition Could Help Fight Crime, author Jim Stenman says, "The mission is to reduce terrorist and criminal activity by improving and expanding biometric identification as well as criminal history information s...
Biometrics unique characteristics have made it important in many domains of identification and authentication. The use of finger p...
The computing industry as a whole becomes more prosperous, exciting and attractive as an employment prospect each day. It spans a wide range of modern applications, as does my interest in the subject. I see computing science as a gateway into new realms of computing, where the highly challenging and demanding work may reap rewards of an equivalent level.
Biometric technology is used for the ways humans can be identified by unique aspects of their bodies, such as fingerprints, body odor, our voices and many more. If one was to think about privacy rights, he/she would be concerned about the widespread adoption of these systems, since such systems could easily be used to develop a record of known rebellious people and/or dangerous criminals, to be used for social control purposes. Although that may seem pretty good and a positive thing for the society, one should take into account of the defects and errors of technology. Of the many biometrics technologies that are being developed and are already developed, facial recognition is one of the most threatening because it can be deployed secretly; one may not know whether or when they can be caught in a surveillance camera for such facial recognition biometrics. Additionally, tests have found that the miscalculations for facial biometrics technologies are very high. As a result, according to Privacy Rights Clearinghouse, innocent people can be erroneously identified as dangerous criminals and actual dangerous criminals and/or suspected terrorists can fail to be detected overall, allowing for a huge injustice and unfairness. Privacy rights concerned with biometrics have sparked a concern and should be dealt with; otherwise, this is just one of the
Face recognition has been regarded as the divine Grail of biometric recognition systems, due to a number of noteworthy advantages over other methods of identification. Video-based face recognition has the advantage over other trustworthy characteristics for biometric recognition, such as iris and fingerprint scans, that it does not require the cooperation of individuals involved in the process.
A fascination for Science & Technology and keen interest in the ever-growing world of technology motivated me to take up engineering. The power of research and delivering it for the growth of Society is what makes me interested in the technology side of science. I choose to major Computer science Engineering with an intense urge to delve into this challenging field. During my under graduation program I learned the various fundamentals of Computer science Engineering which together with practical course works reinforced my interest.
[Jain, 2006]Jain, A.K.; Ross, A.; Pankanti, S., "Biometrics: a tool for information security" Volume: 1 Issue: 2, Issue Date: June 2006, page(s): 125 – 143
“The term -information security- means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction” (United States Code, 2008). In order to ensure the identity of who is trying to access the information, the concept of “Biometric Technology” has been developed in the last years. This essay will start explaining this concept and the characteristics of its development through the time. Then, the essay will offer a brief explanation of biometric systems operation and a description of different biometric systems developed until now. Finally, this research analyzes the current and future applications and the issues that surround it.
As one of the feature of biometric, signature verification is used to find the authenticity of a person to give the access the most valued and important documents and shelf. Firstly the signature of a person are taken as a reference in database. To generate the database, number of attempts from the same person has been taken, as it would permit minute deviations in signatures that generates due to environmental conditions. Once it is done, then the signatures at other times are every time then verified with the existing database. Because of confidentially of the file/document/transaction giving access is the crucial process that should be monitored with perfection. The same happens with offline signature verification. Computerized process and verification algorithm (thus software) takes fully care of signature under test, generate results that are 100% authentic, and advocates credibility of the concerned person .However, there might raise issue of authenticity even if the same person performs the signature. Or, at times a forge person may duplicate the exact signature. Many research have been done to find the accuracy of result so as to prevent from forgery. Forgery is also divided into different categories depending upon their severity as