Você está na página 1de 7

BIOMETRICS

P.Ravindran, II - B.C.A, Department of Computer Science and IT, Kaamadhenu Arts and Science College, Sathyamangalam. Email: ravindran.3191@gmail.com Mobile: 9688824123 R. Indhira, II - B.C.A, Department of Computer Science and IT, Kaamadhenu Arts and Science College, Sathyamangalam. Email: iiindrasivani3@gmail.com Mobile: 9578396379

Abstract: Biometrics is automated methods of recognizing a person based on a physiological or behavioral characteristic. Data mining is the process of posing various queries and extracting useful and often previously unknown and unexpected information, patterns, and trends from large quantities of data, generally stored in databases. Biometrics is seen by many as a solution to a lot of the user identification and security problems in todays networks. Password abuse and misuse, intentional and inadvertent is a gaping hole in network security. This results mainly from human error, carelessness and in some cases maliciousness. Biometrics removes human error from the security equation. Keywords: Introduction, Types, Technologies, Authentication, Applications, Advantages and Disadvantages, Future. 1. INTRODUCTION The word "biometrics" is derived from the Greek metric; which words means 'bios' and life and human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, purposes. on a for authentication is or automated behavioral Biometrics

measurement respectively. This directly translates into "life measurement". Biometrics is the science and technology of measuring and analyzing biological technology, data. In information refers to biometrics

methods of recognizing a person based physiological characteristic. Among the features

measured are; face fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are

technologies that measure and analyze

becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent.

2. TYPES OF BIOMETRICS Two types of biometrics are available. Following figure (2.1) is explained the various types of biometrics. i. Behavioral biometrics ii. Physical biometrics

Figure 2.1 Biometrics Types

Figure 1.1 - Biometrics

i. Behavioral biometric definition: Behavioral biometrics basically measures the characteristics which are acquired naturally over a time. It is generally used for verification. Examples include: Speaker Recognition - analyzing vocal behavior. Signature - analyzing signature dynamics. Keystroke - measuring the time spacing of typed words. of behavioral biometrics

Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies.

ii. Physical biometric definition: Physical biometrics measures the inherent physical characteristics on an individual. It can be used for either identification Examples include: Fingerprint - analyzing fingertip patterns. Iris Scan - analyzing features of colored ring of the eye. Hand Geometry - measuring the shape of the hand 3. BIOMETRIC AUTHENTICATION Biometric authentication systems replace the 'what you know', and 'what you have' approach with the 'who you are' approach, thus ensuring secure systems. Biometric authentication systems work on two basic ideas, namely identification and verification. Biometric Identification Biometric Verification of or verification. biometrics physical

3.1 Biometric Identification: Identification occurs when the biometric system attempts to determined the identify of an individual. A biometric is collected and compared to all the templates in a database. The same process happens in the biometric identification solution. 3.2 Biometric Verification: Verification means verifying a persons identity. Verification occurs when the biometric system attempts to confirm an individuals claimed identify by comparing a submitted sample to one or more previously enrolled templates. Verification evaluates documents, plans, code, requirements, and specifications. Validation, on the other hand, evaluates the product itself. The inputs of verification are checklists, issues lists, walkthroughs and inspection meetings, reviews and meetings. 4. COMPARISON OF VARIOUS BIOMETRIC TECHNOLOGIES Different Biometric technologies performed and we discussed in beginning of this paper. Comparison of the advantages and disadvantages of

biometric technologies The following table compares some of the biometric systems used lately, from the point of view of accuracy, cost, devices required and social acceptability

Based

on

physiological

and

behavioral characteristics 6. APPLICATIONS OF BIOMETRICS Biometric systems, Time which used Clocks are in to or

Biometric time and attendance being various control increasingly organizations

employee timekeeping.
Table 4.1 Comparison Biometric technologies

Biometric safes and biometric locks, provides security to the homeowners.

5. BIOMETRIC IMPORTANCE Biometrics performed in variety of places like Educational institutions, Government office, Airport, Railway, etc. The main points included within this biometrics are followed. Most definitive, real-time tool available today. Possible to combine with other tools to form more secure, easier to use verification solutions. Recognizes definitively. individuals

Biometric systems,

access providing systems

control strong are also

security at entrances. Biometric developed for securing access to pc's and providing single logon facilities. Wireless biometrics for high end security and providing from airport safer transactions Biometrics wireless security

devices like PDA's, etc. devices are also deployed at some of the world's famous airports to enhance the security standards.

7. ADVANTAGES OF BIOMETRICS Increase security - Provide a convenient and low-cost additional tier of security. Reduce fraud by employing hardto-forge technologies and materials. For e.g. minimize the opportunity for ID fraud, buddy punching. Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. prevent unauthorized use of lost, stolen or "borrowed" ID cards. Reduce password administration costs. Replace or observed. Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. hard-to-remember passwords which may be shared

8. DISADVANTAGES OF BIOMETRICS The finger print of those people working in Chemical industries is often affected. Therefore these companies should not use the finger print mode of authentication. It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time. For people affected with diabetes, the eyes get affected resulting in differences. Biometrics is an expensive security solution. 9. BIOMETRIC FUTURE Biometrics as a branch of

industry, science and technology exists since about 20 years. Its size is about 1 billion Euros. Problems and questions

having to do with automatic people recognition are attracting more and more scientists and technician. And, although many devices already exist and/or are being proposed, it is certain its history. that biometrics is still in the early stages of

private Integrated technical

sector

clients. in

Biometrics and applications

provides expertise

business

ranging from network security and transaction systems to access control and large-scale identification References: Bhavani Latifur Thuraishingam khan, Data in and

mining

applications and dallas.

biometrics

systems, The University Texas


Figure 9.1 Biometric Future

I will try to identify and list out new technologies that can already be predicted from present trends. Travel control. Financial and other transactions requiring authorization. Remote voting (authorization). Action control.

Karl Chadwick, James Good, Grainne Kerr, Fintan McGee, Finbarr O'Mahony, Biometric Authentication Access Application. and Bicz , for Network Network Future of

Wieslaw biometrics,

Optel

biometric

publications. http://www.360biometrics.com/ http://www.webopedia.com/TER M/B/biometrics.html http://www.biometricsintegrated. com/

10. CONCLUSION Biometrics biometrics independent Integrated is the and

industry's system

leading

integration

consulting firm, providing a broad range of biometric services to government and

Você também pode gostar