Types of Biometric Systems, PETs and Threats for WSN

   

Added on  2023-06-03

15 Pages3052 Words91 Views
Running head: IT RISK MANAGEMENT
IT Risk Management
Name of the Student
Name of the University
Author’s Note:
Types of Biometric Systems, PETs and Threats for WSN_1
1IT RISK MANAGEMENT
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................8
Question 3................................................................................................................................10
References................................................................................................................................12
Types of Biometric Systems, PETs and Threats for WSN_2
2IT RISK MANAGEMENT
Question 1
Various Types of the Biometric System with Advantages, Disadvantages and Examples
There are several types of biometric authentication system, which are:
i) Face Recognition Systems: This is the first and the most important type of
biometric authentication system (Bhagavatula et al., 2015). It is responsible for helping in the
significant verification or even better identification of that specific individual from the
various digitalized images; either by simply analysis of those images or by comparing the
patterns in the face image.
There are some of the major techniques, which are eventually used for this face
recognition system, which are:
a) Geometry Based: The very first technique of the face recognition system is based
on the face geometry. The fewer relative poses and the edge detection can be easily and
promptly executed by taking the help of this technique (Awasthi & Srivastava, 2013). Three
distinct parts of a face are being considered here for face matching like eyes, mouth and nose.
b) Feature Based: This particular technique is responsible for matching eyes, lips and
nose of the particular individual. These three parts are used as the typical predominant
aspects for the major purpose of finding the appropriate face.
ii) Fingerprint Recognition Systems: The second important type of the biometric
authentication system is the fingerprint recognition system (Sayed et al., 2013). This
specified biometric system subsequently takes down the respective fingerprint images of the
individual and next the basic features such as loops, whorls and arches are recorded only after
undertaking the various outlines like furrow, edge and minutiae.
Types of Biometric Systems, PETs and Threats for WSN_3
3IT RISK MANAGEMENT
There are some of the major techniques, which are eventually used for this fingerprint
recognition system, which are:
a) Correlation: The very first technique of the fingerprint recognition system is the
correlation that could overlay the two typical images of fingerprints by simply associating
within the respective equivalent pixels (Klonovs et al., 2013).
b) Minutiae: The second significant technique of this fingerprint recognition system
is minutiae, which has the ability of storing the plane, when the point set is being included
within the input output minutiae.
iii) Voice Recognition Systems: This is the third and another important type of
biometric authentication system (Bhatt & Santhanam, 2013). The voice recognition systems
could be solely utilized for the proper production of speech patterns by simply combining
both the physiological as well as behavioural features. These specific physiological and
behavioural features could be eventually by proper speech technology processing.
There are some of the major techniques, which are eventually used for this voice
recognition system, which are:
a) Automated Detection of the Voice Signal: The first technique of a voice
recognition system helps in easy and automatic detection of various signals of voices of the
individuals (Abo-Zahhad, Ahmed & Abbas, 2014).
b) Feature Extractions: This is the next technique for the biometric type of voice
recognition systems. Here, the features of the voice of any specific person are being extracted
for proper identification and verification.
iv) Iris Recognition System: The fourth and one of the most important kind of this
biometric authentication system is these iris recognition systems (Chen, Pande & Mohapatra,
Types of Biometric Systems, PETs and Threats for WSN_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management: Types of Biometric Systems, PETs and WSN Threats
|13
|2579
|143

Risk Management: Biometric Methods, PETs, and WSN Threats
|12
|2839
|231

Research on Types of Biometric Systems
|12
|2874
|127

Fingerprinting Authentication: Methods, Matching Techniques, and Performance Evaluation
|13
|967
|462

Biometric Systems, Privacy Enhancing Technologies and Wireless Sensor Networks
|11
|2471
|380

(Solved) Biometric Technology: PDF
|4
|767
|21