Get premium membership and access questions with answers, video lessons as well as revision papers.

State the examples of biometric devices

      

State the examples of biometric devices

  

Answers


Moraa
The examples of biometric devices are

a.) Fingerprint recognition

o A dedicated fingerprint reader is attached to a computer and takes the image data from the scanner and sends it to the database. The user is usually required to leave his finger on the reader for less than 5 seconds during which time the identification or verification takes place. The data received is compared to the information stored within the database.
o In order to prevent fake fingers from being used, many biometrics fingerprint systems also measure blood flow, or check for correctly arrayed ridges at the edges of the fingers.
o This authentication method is accurate and cost effective.

b.) Facial Recognition

o Facial recognition analyses the recorded information of distance between eyes, nose, mouth and jaw edges of an individual's face images captured through a digital video camera.
o Facial recognition is widely used, touted as a fantastic system for recognizing potential threats (whether terrorists, scam artists, or known criminals).
o But so far, it has been unproven in high level usage. It is currently used in the verification only system with a good deal of success.
o The accuracy is fair and the cost involve for this method is reasonable.

c.) Hand Geometry Scanning
o Hand scanning involves the measurement and analysis of the shape of one's hand.
o It is a fairly straight forward procedure and it is surprisingly accurate.
o Although it requires special hardware to use, it can be easily integrated into other devices or system.
o Unlike fingerprints, the human hand is not unique. Individual hand features are not descriptive enough for identification.
o It is possible to revise a method by combining various individual features and measurements of fingers and hands for verification purposes.

d.) Iris Scanning

o Iris scanning analyses the features that exist in the coloured tissues surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles.
o The scans use a regular video camera and can be done from further away than a retina scan.
o It will work perfectly fine through glasses and in fact has the ability to create an accurate enough measurement that it can be used for identification purposes.
o The accuracy of this method is excellent while the cost involved is high.

e.) Retina Scanning

o Retina biometrics involves the scanning of retina and analyzing the layer of blood vessels at the back of the eye.
o Retina scanning involves using a low intensity light source and an optical coupler and can read the patterns at a great level of accuracy.
o Retina scanning requires the user to remove glasses, place their eye close to the device and focus on a certain point.
o Whether the accuracy can overweight the public discomfort is yet to be seen.
o The accuracy in retina scanning is very good and the cost involves is fair.

f.) Voice Recognition

o Voice recognition system compares a person's live speech with their stored voice pattern.
o Voice recognition biometrics requires users to speak into a microphone. What he speaks can be his password or an access phrase.
o Verification time is approximately 5 seconds. To prevent recorded voice use, most voice recognition devices require the high and low frequencies of the sound to match, which is difficult for many recording instruments to recreate well. Also, some devices generate random number of sequences for verification.
o The accuracy in voice recognition is fair and the cost involved is very reasonable.

g.) Signature Verification System

o Signature Verification System recognizes the shape of your handwritten signature, as well as measuring the pressure exerted and the motion used to write the signature.
o Signature Verification System uses special pen and tablet.
o After pre-processing the signature, several features are extracted.
o The authenticity of a writer is determine by comparing an input signature to a stored reference set (template) consisting of three signatures.
o The similarity between an input signature and the reference set is computed using string matching and the similarity value is compared to a threshold.
o The accuracy in Signature Verification System is fair and the cost involved is excellent.

Moraa orina answered the question on April 28, 2018 at 17:53


Next:  What is authentication?
Previous: Why is authentication important?

View More Computer Science Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions