Free Essay

Biometric Technology

In: Computers and Technology

Submitted By abc127
Words 521
Pages 3
Biometric Technology 1

Biometric Technology: Entry Control

Rick Everroad

Professor Jeffrey Fowler

RC 507

October 12, 2008

Biometric Technology 2

Biometric Technology: Entry Control

Biometric Technology is used for human recognition which consists of identification and verification to establish entry into secure areas. The terms differ significantly. With identification, the biometric system asks and attempts to answer the question, “Who is X.” In an identification application, the biometric reader reads a sample of the person in question and compares his traits to all the traits found in the system’s database. Depending on how the system is designed, it can make a “best” match, or it can score possible matches and rank them according to likelihood. Identification applications are common when the goal is to identify criminals, terrorists or any other person attempting entry to a controlled area, particularly through surveillance. Verification occurs when the biometric system asks and attempts to answer the question, “Is this X?” after the user claims to be X. In a verification application, the biometric system requires input from the user, at which time the user claims his identity via a password, which usually is a body part like a hand, eye or a voice command. The user inputs the part into the system and the system finds a match or does not find a match.

Biometric Technology 3

Examples of Biometrics
Retinal Scan

Retinal scanning analyses the layer of blood vessels at the back of the

eye. Scanning involves using a low-intensity light source and an optical

coupler and can read the patterns at a great level of accuracy. It does require

the user to remove glasses, place their eye close to the device, and focus on a

certain point. Whether the accuracy can outweigh the public discomfort is

yet to be seen.

Facial Recognition

Facial recognition analyzes the characteristics of a person's face images

through a digital video camera. It measures the overall facial structure,

including distances between eyes, nose, mouth, and jaw edges. These

measurements are retained in a database and used as a comparison when a

user stands before the camera. This biometric has been widely, and perhaps

wildly, touted as a fantastic system for recognizing potential threats (whether

terrorist, scam artist, or known criminal) but so far has been unproven in

high-level usage. It is currently used in verification only systems with a good

deal of success.

Other types of biometric systems in use today are fingerprints, hand geometry, speaker

recognition, vapor detection and vascular patterns.

Biometric Technology 4

Conclusion

Due to the current security posture of civilian businesses in the world, some are bending an ear to Biometric Technology as a means of controlling entry into their place of work and certain areas which require a higher level of security. This technology is widely used in the military, intelligence and law enforcement sectors as well.

Biometric Technology 5

References
The Gale Group, Inc. (2004) Retina and Iris Scans. Encyclopedia of Espionage, Intelligence, and Security. Retrieved June 17, 2007 from www.wikipedia.org

Rudolph, Terry (1993) The FBI Law Enforcement Bulletin. Retrieved June 17, 2007

from www.articles.com

Similar Documents

Premium Essay

Biometrics Technology

...Biometrics Technology Biometrics Technology Biometrics technology is an authentication method used for measuring a person’s unique physical or behavioral characteristics. When referring to biometrics in information technology, characteristics like fingerprints, DNA, eye retinas and irises, voice pattern, facial patterns, and hand measurements are all used for authentication purposes. Biometric science did not originate at one single place as people all over the world have been using it for identifying individuals from each other. The history of biometrics dates back to as early as the 14th century in the form of fingerprinting by China. This was reported by explorer Joao de Barros who wrote that the Chinese merchants were stamping children’s palm prints and footprints on paper with ink so young children could be identified from one another. This primitive form of biometrics is still being used today. Biometrics was used in the 1800 in for form of photographic memory. It wasn’t until the 1890’s that an anthropologist and police desk clerk in Paris, Alphonse Bertillon, created a field of study to find a way to identify convicted criminals. Bertillon developed the technique of taking multiple body measurements and was used throughout the world until it was discovered that some people have the same measurements making this technique unusable. After this failed the police went to fingerprinting which was created by Richard Edward Henry of Scotland Yard, who just reverted...

Words: 1831 - Pages: 8

Premium Essay

Biometric Identification Technology

...| Biometric Identification Technology | | By Group C: | HUMN432 | 6/10/2012 | | Table of Contents Introduction History of Biometric Identification Biometric Identification Advancement Timeline * Types of Biometric Identification Technologies and How They Work Benefits of Biometric Identification Technology How and Where Biometry is Used In the USA Controversial Issues and Legalities of Biometric Identification Conclusion Bibliography Introduction Biometric Identification Technology is the world-wide used computer science that identifies humans based on physiological and behavioral traits for access control and security. The computer processing idea has been around for hundreds of years but the equipment has only been available for the past several decades evolving to become better with each step. The need for a formal system to record and identify first-time and repeated offenders in the 1800s led the known Bertillon to develop anthropometrics to identify individuals. This advancement was later linked with computer systems to create a true biometric system identifier. The several types of biometric identifiers, later discussed, have evolved from a mere idea to an implemented security system used in airports, government programs, and even small businesses. The technology is used globally from the US to the UK, India, Germany, and many more. Its long history has created responsiveness and allowed countries to embrace the welfares of such a...

Words: 7486 - Pages: 30

Premium Essay

Biometrics Technology in Healthcare Industry

...Biometrics Technology in Healthcare sector Miss Chawisa Srisinthara Mr. Sangsan Poonyapotapirata Miss Chadaporn Champangoen Miss Tanwarat Trangpanich Mr. Ekapol Koosuwan NIDA Business School National Institute of Development Administration 118 Seri Thai Road, Bangkapi, Bangkok 10240, Thailand Email : Caocao_akatsuki@hotmail.com Tel. +66890710010 Biometrics Technology in Healthcare sector ABSTRACT Nowadays, Biometrics has become an important system in a process for all industries due to this technology can help the companies to manage the data such as gathering, integration, and summary. The companies can also apply this system in every working process steps. Besides, the data can be transferred from paper-based data into computer-based data which is convenience, safety, and accuracy. Moreover, The Biometrics system provides excellence operation and improves productivity. Especially, the biometrics system should be executed in healthcare industry because the patient information is classified and considerable for healthcare providers. 1. Introduction The “Biometrics” is the combination of “Bio” which means a creature and “Metrics” which means a characteristic that can be measured and estimated an amount. So, Biometrics is the biological technology that integrates between biological, medical, and computer technology. It use for measure physiological characteristics and behaviors that is the individual character of each person for identification...

Words: 5739 - Pages: 23

Premium Essay

Student Attendance System Using Fingerprint

...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...

Words: 3961 - Pages: 16

Free Essay

Biometrics

...Biometrics within Financial Institutions Abstract This paper presents a problem with the use of technology within the Credit Unions and Banking industries. Technological innovations have allowed the industry to be more open to consumers and challenges that the current economy has posed. Modern technology is also change the landscape of how, when and where business is conducted with financial institutions and consumers, businesses, and other organizations. Technology driven issues such as privacy, security and trust, have been pushed to the forefront, which makes the line between mobile banking and banking online increasing difficult to distinguish. Credit Unions like other banking institutions rely on gathering, processing, analyzing and providing information to meet the demands of the consumer. Given the importance of information systems within banking its not surprising to find, risks within the systems are developing in nature. History Truliant Federal Credit Union was started in Winston-Salem, North Carolina around 1952. They serve over 180,000 member owners and more than 900 business and organizations with $1.6 billion in assets. Truliant as it will be referred to in this paper has 21 financial locations in North Carolina, South Carolina, and Virginia. One philosophy that stands out or is a representation of what this particular Credit Union stands for is “ people helping people”. Like other not for profit organizations, they provide individuals and small business with...

Words: 1787 - Pages: 8

Free Essay

Criminal Identification Procedures in the 21st Century

...officials in identifying a criminal suspect. The technological advances that continue to assist the criminal justice system in these identifications are Deoxyribonucleic Acid (DNA) analysis, biometric identification, Intra-agency databases for DNA, fingerprinting and palm printing, and camera and wiretap surveillance. Each aspect serves a specific purpose in making certain that the right person is properly identified for the crimes that they commit. Each technological aspect makes certain that the criminal justice system can prove without a doubt that the person under arrest is the person responsible for committing the crime. Criminal Identification Procedures Deoxyribonucleic Acid (DNA) analysis is an examination method that allows any organism to be identified, by its genetic sequences. DNA analysis is highly accurate, important, and used all across the world for important reasons. The main purpose for DNA analysis is identifying individuals who are suspects in criminal cases, identifying victims or their remains when other means of identity is not possible. The advantages of DNA analysis are reliable, accurate results, and helps solving old and new cases. The disadvantage of DNA analysis is it reveals information on physical state, this information is sensitive and must be guarded. Biometric Identification is a system based around the main physical characteristics of the human body such as finger print identification, hand geometry, palm vein authentication, retina scan, iris...

Words: 1407 - Pages: 6

Free Essay

Biometric Uid Authentication Using Visual Cryptography

...[1] A.K. Jain and A. Ross, “Biometrics: a tool for information security”, IEEE Transaction on Information Forensics and Security, vol. 1, no. 2, Jun. 2006. [2] C. Blundo, A. De Santis, and D.R. Stinson. On the contrast in visual cryptography schemes. J. Cryptogr., 12:261-289, 1999. [3] J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu. Visual secret sharing for multiple secrets. Pattern Recognition, 41:3572-3581, 2008. [4] A. Ross and A. A. Othman, “Visual Cryptography for Biometric privacy”, IEEE Transaction on Information Forensics and Security, vol. 6, no. 1, Mar.2011. [5] M. Naor and B A. Shamir. Visual cryptography. in: A. De San tis (Ed.), Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, 950: 1-12, 1995. [6] C.C. Wu and L.H. Chen. A study on visual cryptography, Master Thesis. PhD thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998. [7] M. Naor and A. Shamir “Visual cryptography:Improving the contrast via the cover base” IACR Eprint archive, 1996. [8] C. Blundo and A. De Santis and D.R. Stinson, “On the contrast in visual cryptography schemes”, Jurnal pf cryptography, vol. 12, pp. 261-289, 1996. [9] G. Ateniese and C. Blundo and A. De Santis and D.R. Stinson,“Extended Schemes for Visual Cryptography”, Theoretical Computer Science, 1996. [10] Z. Zhouand and G. R. Arce and G. Di Crescenzo, “Halftone visual cryptography” IEEE Trans. Image Process, vol. 15, no. 8, pp. 2441-2453...

Words: 715 - Pages: 3

Free Essay

New Biometrics Process for Conditional Permanent Residents

...U.S. Department of Homeland Security February 28, 2007 UPDATE New Biometrics Process for Conditional Permanent Residents U.S. Citizenship and Immigration Services (USCIS) announces the implementation of a new nationwide biometrics process for conditional permanent residents who file Form I-751, Petition to Remove Conditions on Residence. The new process is effective immediately. Under the old process, following the approval of Form I-751, an approval notice was issued instructing the applicant to appear at a USCIS District Office for processing of his or her Form I-551, Permanent Resident Card (“Green Card”). The approved applicant would manually submit passport-style photographs, index fingerprints, and a signature on Form I-89, I-551 or I-586 Card Data Collection Form, for creation of his or her permanent resident card. The new process, as authorized in 71 Federal Register 15469 (March 28, 2006), requires all conditional permanent residents to appear at a USCIS Application Support Center (ASC) after filing Form I-751 in order to have their biometrics electronically captured. An ASC appointment notice will automatically be sent by mail to the applicant with the specific date, time and location for biometric processing. Biometric processing includes the electronic capture of an applicant’s photograph, signature, index fingerprint and ten-print fingerprints. The photograph, signature and index fingerprint are used to generate the lawful permanent resident card, if the Form...

Words: 769 - Pages: 4

Free Essay

Technology & Communication

...Technology and Communication Paper University of Phoenix CJA/304 Mrs. Palmer August 10, 2011 Technology and Communication Paper Technology has helped enhance communication between others and has especially helped with communication in the criminal justice system. Technology has affected the communication capabilities of specialized databases in the criminal justice system in many different ways. Many forms of technology are used to help with communication such as mobile data terminals and iris scans in the criminal justice system. In this paper, this student will compare different types of specialized databases and will also discuss over positive and negative effects due to new technologies. Mobile data terminals are used in the criminal justice system as a form of specialized database to help with communication. “A mobile data terminal (MDT) is a computerized device used in public transit vehicles and emergency vehicles to communicate with a central dispatch office” (Versaterm, 2011). There are many large police agencies that require all law enforcement officers to have a wireless mobile terminal system installed in their vehicles. This database can help law enforcement officers with workload management in the communication center and they can also help better time management of officers and help greater efficiency. Mobile data terminals can also help with communication between officers and dispatch by letting the officers have access to dispatch receipts...

Words: 1044 - Pages: 5

Free Essay

Case Study

...the access to the dormitory. The project will start with dormitory as a pilot project. The project will entail getting the survey of the dormitory and assessing the areas where the card reader will be installed. There will also be the need to integrate the system with the camera system which is already in place. The project will also include having a records system which will include the details of all the people who are authorized to access the dormitory (Liu, & Silverman, 2001). This will mean that there is a server which contains all the details of the students and staff members who are able to gain access to the building. The system will then be connected to the camera system so that there will be the possibility to have a biometric system. The biometric system will make use of the face of the person so that they will be able to get the required information (Kerzner, 2013). The cards will have to be integrated with the information that will be required to give access to the card-owner. Tasks 1. Undertake feasibility study of the dormitory. This is where the dormitory is assessing to check where the system will be installed and how the camera system will be connected to the access control system. 1.1 Assess the physical access and how it has been designed. This is where the access to the dormitories is checked so that it will be clear where the doors and windows have been placed. This will help to design a new access system 1.2 Assess the possibilities of interconnecting...

Words: 930 - Pages: 4

Free Essay

Biometrics and Privacy

...Biometrics and Privacy Strayer University SEC 305 Biometrics implements a process used to identify or authenticate an individual’s identity using a physical or behavioral characteristic. The goal is to provide access control at the logical and physical levels. An individual's voice, fingerprint, iris, and hand geometry are examples of physical characteristics. Behavioral characteristics could include signature or writing style. The implementation of a biometrics system requires coordination between the individual and the organization or business implementing the technology. During the enrollment process an individual provides a sample of a biometric: a fingerprint, an iris scan, voice recording, and so on. The sample, taken multiple times for the sake of accuracy, is averaged and stored within a database, token, or smartcard as a compressed digital representation of the sample. When a live sample of a biometric is presented to the system it is compared to the recorded information, or template, provided during the enrollment process and a match is determined to within an acceptable threshold value. This response determines an individual’s right to gain access to a privileged area, data, or just a PC. The advantage to a biometric is that it doesn’t change. It goes where you go, so it’s difficult to lose. It’s also very difficult to forge or fake. In some cases, it is next to impossible. It provides a very strong access control security...

Words: 738 - Pages: 3

Premium Essay

Biometric Security in the Workplace

...Abstract Biometrics has garnered considerable interest from both the Government and private industry. This interest has lead to a number of biometric technologies each with their own share of strengths and weaknesses. The process used in the verification and identification of people using fingerprint, retina-based, iris-based, hand geometry, and facial recognition biometrics are examined in this paper. The advantages and disadvantages of each of these methods are also explored. The future of biometrics is also considered given the current developments in the field.   Organizations are constantly looking for a more secure authentication method for their users to gain access to e-commerce and other security applications. Biometrics continues to gain more and more attention. What is biometrics the right decision for your corporation? If you choose to use biometrics, which is the biometric solution for your corporation, there is no such thing as any one best type of biometrics. Different applications necessitate the use of different biometrics. In order to select the right biometric for your solution as a user you will need to investigate a myriad of vendor products while keeping an eye on future development and technology. Never before have there been more various and more varied options. Vendors have a wide variety of products to select from. Some are new to the market but even these can be considerably better and greatly improve your company security stance. The focus...

Words: 3807 - Pages: 16

Premium Essay

Biometric

...springer.com/chapter/10.1007/978-3-642-01793-3_20 Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic parameters and real biometric data. Results of bias correction in the verification systems differ considerable between synthetic data and real data: while the bias is responsible for a large part of classification errors in the synthetic facial data, compensation of the bias in real facial data leads only to marginal improvements. https://www.eff.org/wp/biometrics-whos-watching-you September 14, 2003 September 2003 Introduction Among the many reactions to the September 11 tragedy has been a renewed attention to biometrics. The federal government has led the way with its new concern about border control. Other proposals include the use of biometrics with ID cards and in airports, e.g. video surveillance enhanced by facial-recognition technology. The purpose of this document is to sketch out EFF's concerns about biometrics. In today's public arena, biometric technologies are being marketed as a "silver bullet" for terrorism; however, very little independent, objective scientific testing of biometrics has been done. Deploying biometric systems without sufficient attention to their dangers makes them likely to be used in a way dangerous...

Words: 7685 - Pages: 31

Free Essay

Term Paper

...Abstract In recent year’s biometrics have started to make a major positive impact in our nation’s police departments. Biometrics is a technology that can make police departments safer, more effective and more efficient by saving time and money. Biometrics uses a person’s biological markers such as fingerprints, palm prints, facial features, and iris information for various uses. This paper will discuss how biometrics is applied to police technology such as smart guns, iris scanners, fingerprint scanners, and facial recognition systems. This document hopes to provide police departments with enough information to make an informed decision on bringing biometric technology into their units. This document will also touch on amendment rights pertaining to biometric technology in order to make departments aware of how this technology pertains to a citizen’s civil rights. Biometrics is rapidly advancing in our society and police departments need to be aware of how beneficial this technology really is. Biometrics: How Are Police Departments Utilizing This Technology? Biometrics is defined as using inherent human characteristics as a form of identification and access control. There are more than six billion people on our planet and each one can be identified as different by their biometric characteristics (Baker, 2011). With that many people out there police officers now more than ever need a quick and accurate way to identify suspects when working the field. The way they...

Words: 2214 - Pages: 9

Premium Essay

Biometrics Moving Forward

...BoBiometrics to Secure Networks John W. Sisson American Public University Contents Abstract 3 Biometrics to Secure Networks 4 Biometrics Defined 4 Biometric Process 5 Fingerprinting 6 Face Recognition 7 Iris Recognition 8 Hand Recognition 9 Voice Recognition 9 Dynamic Signature 10 Keystroke Dynamics 10 Gait Recognition 10 Facial Thermograph 11 Emergence 11 Obstacles to Biometric Success 12 Conclusion 13 References 15 Abstract Biometrics was once thought to be more of a science fiction means of authentication, not something that could be used in real life applications. The cost was much higher than most companies dreamed of spending. Username and passwords were an effective and efficient means of security. Computer security was not looked at as a must, but more of a way to keep honest people honest. However, as computing power increased, and corporate espionage has led to massive losses for companies, computer security needs increased. Passwords just were not the best means of securing a network anymore. At the same time, improvements in technology made the use of biometrics more efficient. We will now examine the different types of biometric and how they will make the network more secure. Biometrics to Secure Networks For years, passwords have been the method used to secure networks. A user would input his or her userid and password to gain access. Many times, the userid was also the first portion of the users E-mail address. This means...

Words: 3757 - Pages: 16