Get premium membership and access questions with answers, video lessons as well as revision papers.
The examples of biometric devices are
a.) Fingerprint recognition
o A dedicated fingerprint reader is attached to a computer and takes the image data from the scanner and sends it to the database. The user is usually required to leave his finger on the reader for less than 5 seconds during which time the identification or verification takes place. The data received is compared to the information stored within the database.
o In order to prevent fake fingers from being used, many biometrics fingerprint systems also measure blood flow, or check for correctly arrayed ridges at the edges of the fingers.
o This authentication method is accurate and cost effective.
b.) Facial Recognition
o Facial recognition analyses the recorded information of distance between eyes, nose, mouth and jaw edges of an individual's face images captured through a digital video camera.
o Facial recognition is widely used, touted as a fantastic system for recognizing potential threats (whether terrorists, scam artists, or known criminals).
o But so far, it has been unproven in high level usage. It is currently used in the verification only system with a good deal of success.
o The accuracy is fair and the cost involve for this method is reasonable.
c.) Hand Geometry Scanning
o Hand scanning involves the measurement and analysis of the shape of one's hand.
o It is a fairly straight forward procedure and it is surprisingly accurate.
o Although it requires special hardware to use, it can be easily integrated into other devices or system.
o Unlike fingerprints, the human hand is not unique. Individual hand features are not descriptive enough for identification.
o It is possible to revise a method by combining various individual features and measurements of fingers and hands for verification purposes.
d.) Iris Scanning
o Iris scanning analyses the features that exist in the coloured tissues surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles.
o The scans use a regular video camera and can be done from further away than a retina scan.
o It will work perfectly fine through glasses and in fact has the ability to create an accurate enough measurement that it can be used for identification purposes.
o The accuracy of this method is excellent while the cost involved is high.
e.) Retina Scanning
o Retina biometrics involves the scanning of retina and analyzing the layer of blood vessels at the back of the eye.
o Retina scanning involves using a low intensity light source and an optical coupler and can read the patterns at a great level of accuracy.
o Retina scanning requires the user to remove glasses, place their eye close to the device and focus on a certain point.
o Whether the accuracy can overweight the public discomfort is yet to be seen.
o The accuracy in retina scanning is very good and the cost involves is fair.
f.) Voice Recognition
o Voice recognition system compares a person's live speech with their stored voice pattern.
o Voice recognition biometrics requires users to speak into a microphone. What he speaks can be his password or an access phrase.
o Verification time is approximately 5 seconds. To prevent recorded voice use, most voice recognition devices require the high and low frequencies of the sound to match, which is difficult for many recording instruments to recreate well. Also, some devices generate random number of sequences for verification.
o The accuracy in voice recognition is fair and the cost involved is very reasonable.
g.) Signature Verification System
o Signature Verification System recognizes the shape of your handwritten signature, as well as measuring the pressure exerted and the motion used to write the signature.
o Signature Verification System uses special pen and tablet.
o After pre-processing the signature, several features are extracted.
o The authenticity of a writer is determine by comparing an input signature to a stored reference set (template) consisting of three signatures.
o The similarity between an input signature and the reference set is computed using string matching and the similarity value is compared to a threshold.
o The accuracy in Signature Verification System is fair and the cost involved is excellent.
Moraa orina answered the question on April 28, 2018 at 17:53
- What is authentication?
(Solved)
What is authentication?
Date posted: April 28, 2018. Answers (1)
- Why do we need privacy?
(Solved)
Why do we need privacy?
Date posted: April 28, 2018. Answers (1)
- How does computer technology threaten the privacy of our data? (Solved)
How does computer technology threaten the privacy of our data?
Date posted: April 28, 2018. Answers (1)
- Define privacy(Solved)
Define privacy
Date posted: April 28, 2018. Answers (1)
-
State the types of Intellectual Property Protection. (Solved)
State the types of Intellectual Property Protection.
Date posted: April 28, 2018. Answers (1)
- Define law(Solved)
Define law
Date posted: April 26, 2018. Answers (1)
- Define Ethics (Solved)
Define Ethics
Date posted: April 26, 2018. Answers (1)
- State the examples of unethical computer code of conducts
(Solved)
State the examples of unethical computer code of conducts
Date posted: April 26, 2018. Answers (1)
- Explain the impact of ICT on the society(Solved)
Explain the impact of ICT on the society.
Date posted: April 26, 2018. Answers (1)
- Explain the Usage of ICT in Daily Life(Solved)
Explain the Usage of ICT in Daily Life.
Date posted: April 26, 2018. Answers (1)
- Describe the evolution of computer(Solved)
Describe the evolution of computer
Date posted: April 26, 2018. Answers (1)
- There are two styles commonly used in LATEX to write bibliography. Name them and giving a valid reason explain which one is more flexible.(Solved)
There are two styles commonly used in LATEX to write bibliography. Name them and giving a valid reason explain which one is more flexible.
Date posted: April 24, 2018. Answers (1)
- State six risks to the information(Solved)
State six risks to the information.
Date posted: April 24, 2018. Answers (1)
- Define windows firewall and explain its functions(Solved)
Define windows firewall and explain its functions
Date posted: April 24, 2018. Answers (1)
- State the tools included with Windows 7, which protect the computer
(Solved)
State the tools included with Windows 7, which protect the computer
Date posted: April 24, 2018. Answers (1)
- 1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)(Solved)
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
Date posted: April 24, 2018. Answers (1)
- Define (i)operating system (ii)windowing(Solved)
Define
i)operating system
ii)windowing
Date posted: April 24, 2018. Answers (1)
- State the Golden Rule Interface of Design
(Solved)
State the Golden Rule Interface of Design
Date posted: April 24, 2018. Answers (1)
- Differentiate between physical design and conceptual design(Solved)
Differentiate between physical design and conceptual design
Date posted: April 24, 2018. Answers (1)
- State the advantages and disadvantages menu Selection Interaction Style(Solved)
State the advantages and disadvantages menu Selection Interaction Style
Date posted: April 24, 2018. Answers (1)