Escolar Documentos
Profissional Documentos
Cultura Documentos
ISSN No:-2456-2165
Abstract:- Now days, security of the confidential When user request to unlock device with the pattern, then
information of the organization or an individual become internally system will check the requested characteristic is
a serious issue. Because of vulnerability of system allow match or not in device.
to unauthorized person to access the confidential If it matches then give access only to authenticate user or
information or data. Because of unauthorized access the if it not match then the system/device will not unlock.
confidentiality of information get break. So, biometrics is
a good hierarchy to maintain the security of the B. Previous Invented Biometrics
confidential data. Accordingly, Biometrics refers to the Face Recognition
physical and behavioral characteristics of the human, The technology “Face recognition” is frequently use in
Such as face recognition, voice, gait, finger print, palm Biometric; it is use as a pattern lock for the system.
retina etc. Correspondingly, by using of biometrics it is Certainly unauthorized person cannot equip to unlock the
possible to establish an individual identity based on system. [2]
“who user is rather than “what he holds or own”. In this
paper we make a survey on previous biometrics topics, When user wants to unlock the system then he request
its advantages and disadvantages and related privacy to system, system analyzes his face check the person is
concerns. authorize or not in database then, if authorized then system
give access to that person. For scrutinizing face “Face
Keywords:- Biometrics, Recognition, Identification, recognition” scanner is use. Scanner analyzes the face on the
Verification etc. basis of face structure, I.e. eyes, eyebrows, lips, nose, and
chin.
I. INTRODUCTION
A. Biometrics System
Radically, Biometrics is a technology use to protect or
maintain confidentiality and integrity of the data. Each of
human being have there own characteristics like fingers, Fingerprint
face, retina, voice, gait, handwriting. [1]
Each human being have unique fingerprint. As two Nevertheless palm recognition required a large area for
twins also not have same fingerprints .It is ideal for end- scanning so it is superior touse a fingerprint authentication.
users or give rights only to authorize person. [2]
Voice recognition
The technology which appertains to individual posture By reason of human voice changes according to its
furthermore analyzes a person on the base of his walking increased age and also due to emotional conditions.[2]
style is nothing but “Gait recognition”[2] Moreover it has one limitation that voice is sensitive due to
Radically it is a behavioral biometric so it detects a person some factors like background noise.
through its behavior.
II. LITERATURE REVIEW
Palm Recognition
Face Recognition technique is invented by Woodrow
bleasoe & Helen wolf in 1965 .It gives accurate result and it
required camera as an identifier device, its cost minimum. It
identifies authorized face on basis of face structure.
Device Social
Biometrics Inventor and Year Accuracy Cost Identification based on
required need
1 Face Woodrow bleasoe & Helen wolf Face
High Medium Camera high
recognition (1965) (eyes,eyebrows,nose,lips,chin)
2 Henry faulds
Finger
Fingerprint (1843) High Medium Scanner High
(ridges and valleys)
3 Curleton Simon & dr.fsadore
Eyes
Retina Goldstein High High Camera Low
(retina and blood vessels)
(1935)
4 Palm Palm
- Medium Medium Scanner Low
recognition (ridges, valleys ,lines wrinkles)
5 Christian Ottofischer Body
Gait Medium Medium Scanner Low
(1980) (posture walking style)
6 Voice Lenny Baum Microph Voice
Medium Medium High
recognition (1970) one (vocal tracts)
Table 1- Critical Analysis of Biometric Techniques
REFERENCES