Biometric Techniques – Enhancing Security Standards In High Performance Enterprise


In today’s digital economy, where many important activities are finished the assistance of computer, the need for reliable, simple, flexible and secure system is a high interest and a challenging issue for the organisation. Every day security breaches and transaction fraud increases, the dependence on secure identification and personal verification technologies is becoming a great concern to the organisation. By measuring something unique a good individual and using that to identify, a company can dramatically improve their security measures. Awareness of security issues is rapidly increasing among company how they want to protect the information which can be a greatest asset that vehicle possesses. The organisation in order to protect this information from either internal or external real danger. Security plays a very part in the organization and to produce computer system secure, various biometric techniques have been developed. Today biometric techniques are a stable method of recognising the identity of a person based on physiological or behavioral qualities. Biometrics techniques exploit human’s unique physical or behavioral traits in order to authenticate people. Characteristics measured are face, fingerprints, hand geometry, iris, retinal, voice and many others. Biometric authentication is increasingly being employed in areas like banking, retailing, defense, manufacturing, health industry, stock exchange, public sector, airport security, internet security software etc. Biometric technologies are providing a highly-secure identification and verification solutions. Biometric techniques are an attempt in providing a robust solution several challenging problems in airport security. Biometrics focuses on the analysis of physical or behavioral traits that determine individual identity. Biometrics can he used to substantiate the identity of one based regarding the measurement and analysis of unique physical and behavioral data. Indeed, biometrics techniques increasingly are being viewed for the reason that preferred to be able to confirm ones own identity accurately.

The reputation for biometric techniques is not new, it trace its origin throughout the past. The ancient biometric technique which was practiced any form of finger printing being used in China in the 14th century, as reported by the Portuguese historian Joao de Barros. The Chinese merchants were stamping children’s palm and footprints on paper with ink to distinguish the babies from eath other. Biometrics the ancient Greek word is the combination of two words -bio means life, metric means sizing.It is the study of options for uniquely recognizing humans dependant upon physical or behavioral characterstics. The physiological characterstics are fingerprint, face, hand geometry, DNA and iris respect. Behavioral are related to the behavior of specific like signature, study of keystroke, voice etc. Thus a biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed through user. Biometric characteristics are collected employing a device referred to as a sensor. These sensors are used to acquire the information needed for verification or identification and convert the info to a digital code. The quality of the device chosen to capture data has a impact using a recognition results. The devices could be dslrs for face recognition, ear recognition etc or a cell phone for voice recognition etc. A biometric system operates in verification mode or identification mode. In verification mode the system validates human being can identity by comparing the captured biometric data with the biometric template stored inside of the database and is mainly ideal for positive interest. In the identification mode your machine captures the biometric data of just one and searches the biometric template involving users in the database till a match is not found.


o Face Recognition

The biometric system can automatically recognize a person by encounter. This technology works by analyzing specific features hard like – the distance between the eyes, width of the nose, position of cheekbones, jaw line, chin ,unique shape, pattern etc. These systems involve measurement of the eyes, nose, mouth, together with other facial features for identification. To increase accuracy these systems also may measure mouth and lip movement.Face recognition captures characteristics of a face either from video or still image and translates unique characteristics for a face to the set of numbers. These data collected from deal with are combined in distinct unit that uniquely identifies each gentleman. Sometime the features of the face are analyzed like the continued changes in the face while smiling or crying or reacting to different situation etc.The entire face of the body’s taken into consideration or the various part of the face is taken into account for the identity of a person. The highly complex technology. The data capture with the help of video or thermal image. The user identity is confirmed by checking the screen. The primary benefit to working with facial recognition as a biometric authenticator is people today are which is used to presenting their faces for identification and instead of ID card or photo identity card this technique will be advantageous in identifying a person. As the person faces changes by the age or person goes for plastic surgery, in circumstance the facial recognition algorithm should measure the relative position of ears, noses, eyes and other facial features.

o Hand Geometry:

Hand geometry is techniques that capture the physical characteristics belonging to the user’s hand and control. It analyses finger image ridge endings, bifurcations or branches made by ridges. Scalping strategies measure and record the length, width, thickness, and surface area of an individual’s hand. Is actually usually used in applications like access control and along with attendance other people. It is easy to use, relatively inexpensive and widely accepted. A camera captures a 3 dimensional picture of the wrist. A verification template is created and held in the database and is compared to the template at the time of verification to a person. Fingerprint identification.Currently fingerprint readers have been built into computer memory cards to be employed with laptops or PCs and also in cellular telephones, and personal digital admin assistants. It is successfully implemented in the community of physical access keep control on.

o Eye Recognition:

This technique involves scanning of retina and iris in vision. Retina scan technology maps the capillary pattern of the retina, a skinny nerve by the back with the eye. A retina scan measures patterns at over 400 situations. It analyses the iris belonging to the eye, the colored ring of tissue that surrounds the pupil of the eye. This is a highly mature technology with a successful track record in a number of application areas. Retina scanning captures unique pattern of blood vessels where the iris scanning captures the iris. The user must concentrate on a point and launched in that position the system uses ray of light to capture the unique retina characterstics.It is extremely secure and accurate and used heavily in controlled environment. However, it is expensive, secure and requires perfect alignment and usually user must look in to the device appropriate concentration. Iris recognition is probably the most reliable biometric identification and verification methods. The time used by security for travellers.Retina scan is used in military and government organization. Organizations use retina scans primarily for authentication in high-end security applications to control access, for example, in government buildings, military operations or other restricted quarters, to authorized personnel really only. The unique pattern and characteristics on human iris remain unchanged throughout one’s lifetime and no two persons in planet can have the same iris pattern.

o Voice Biometrics

Voice biometrics, uses the individuals voice to ensure or identify the sufferer. It verifies as well as identifies the sub. A microphone on a standard PC with software program is required to analyze the unique characteristics of the individual. Mostly used in telephone-based applications. Voice verification is easy to use and doesn’t need a great deal of user education. To enroll, the user speaks a stipulated pass phrase into a microphone or telephone handset. The system then creates a template based on numerous characteristics, including pitch, tone, and shape of larynx. Typically, the enrollment process takes less in comparison to minute for your user to finish. Voice verification is one for the least intrusive of all biometric methods. Furthermore, voice verification is easy to use and does not require a number of user training courses.

o Signature Verification

Signature verification technology may be the analysis of an individual’s written signature, including the speed, acceleration rate, stroke length and pressure applied during the signature. Are actually different to be able to capture data for analysis i.e. a wonderful pen enables you to recognize and analyze different movements when writing a signature, the data will then be captured within the pen. Information can also be captured quickly special tablet that measures time, pressure, acceleration as well as the duration the pen touches it you.As the user writes on the tablet, the movement of the pen generates sound against paper an is used as verification. An individual’s signature can make over time, however, which can result in the system not recognizing authorized users. Signature systems could depend on the device like special tablet, a special pen and many more. When the user signs his name on searching for pad, as compared to merely comparing signatures, the device instead compares the direction, speed and pressure from the writing instrument as it moves along side pad.

o Keystroke

This method relies for a fact every single person has her/his own keyboard-melody, that is analysed as soon as the user products. It measures the time taken with user in pressing an key or searching for a particular key.


o Vein/vascular patterns: Analyses the

veins in, for example, the hand and the.

o Nail identification: Analyses the tracks in their nails.

o DNA patterns: it can be very expensive technique irritated takes a long time for verification/identification of specific

o Sweat pore analysis: Analyses approach pores on a finger are found.

o Ear recognition: Shape and size of an ear are unique for everyone.

o Odour detection: Individual is verified or identified by their smells.

o Walking recognition: It analyses the way the person treks.

Should you loved this information and you want to receive details about attendance tracking system;, i implore you to visit our own web-page.

Leave a Reply

Your email address will not be published.