Ask a question from expert

Ask now

Security Assignment: Fingerprinting vs Face Recognition

27 Pages7463 Words220 Views
   

Added on  2020-05-28

Security Assignment: Fingerprinting vs Face Recognition

   Added on 2020-05-28

BookmarkShareRelated Documents
Running head: FINGERPRINTING VS FACE RECOGNITIONFingerprinting is superior to face recognition as a biometric authentication mechanismName of the Student:Name of the University:
Security Assignment: Fingerprinting vs Face Recognition_1
1FINGERPRINTING VS FACE RECOGNITIONTable of Contents1.0 Introduction................................................................................................................................21.1 Background of the study........................................................................................................32.0 Fingerprint recognition vs Face recognition as biometric authentication mechanism..............32.1 Is Fingerprint recognition better............................................................................................32.2 Is Face recognition better.......................................................................................................42.3 Fingerprint identification process..........................................................................................52.4 Face recognition process........................................................................................................62.5 Advantages and disadvantages of Fingerprint recognition....................................................72.6 Advantages and disadvantages of Face recognition............................................................102.7 Examples of fingerprint recognition and face recognition..................................................112.8 Next generation of authentication- Apple Face ID..............................................................152.9 Compare fingerprint recognition and face recognition........................................................163.0 Conclusion...............................................................................................................................20References......................................................................................................................................22
Security Assignment: Fingerprinting vs Face Recognition_2
2FINGERPRINTING VS FACE RECOGNITION1.0 Introduction The report is based on “Fingerprinting is superior to face recognition as a biometricauthentication mechanism.” Biometric applications are used in various industries andgovernmental sector. Biometric identification refers to identify the individual based on people’sdistinguishing characteristics. It is the method to recognize the human based on physical andbehavioural traits (Galbally, Marcel and Fierrez 2014). Automated identification and verificationof the individuals is based on unique behavioural characteristics like fingerprints, facerecognition, iris and others. From thousands of years, fingerprint biometric authentication isexisted. In the year 1970s, biometric appeared as automated technology (Larrain et al. 2017).There are three basic components of biometric system: automated mechanism which scans andcaptures digital image, mechanism process and store the data and third component interfaceswith application system. The report provides a debate on fingerprint and face recognition as biometricauthentication mechanism. Most of the industries are using biometrics to control physical accessto the buildings. Due to advancement of technology, this trend is begun to grow. Increasing needof biometric authentication reduces the fraud and provides a secure environment to public. Mostof the biometric control system follows of simple model to process and store the data. The wayto access the system is to enrol the system. Enrolment is needed to generate of referencetemplate. As per the device, the enrolment method varies and involves of scanning to achieve ofaccurate measurements (Berini et al. 2016). The template provides reference for comparing whenaccess to attempt is to be made. It stores and misuses the template which creates most concernsfor the users.
Security Assignment: Fingerprinting vs Face Recognition_3
3FINGERPRINTING VS FACE RECOGNITION1.1 Background of the studyGalbally, Marcel and Fierrez (2014) stated that biometric are gaining of popularity asauthentication method in various organizations. Wang et al. (2015) argued that it is a type ofaccess control system based on biological qualities of user. There are various types of biometricsauthentication methods such as face recognition, fingerprint, iris recognition and others. Best-Rowden and Jain (2018) mentioned that the advantage of using biometrics is that it offers ofextra security. As fingerprints are unique, therefore it is unrepeatable for the users and for eachperson. Its level of security is maximum, as compared to other biometric methods. Itsmaintenance cost is also low and after completion of installation, there is minimum costassociated with maintenance (Liu, Zhang and Shen 2015). There is no such requirement ofadditional devices for the entry. By means of fingerprint access control, there are no requirementto use of traditional keys and switches. Jain et al. (2017) argued that behind the benefits, thereare also limitations of this method. It is less convenient in case of the users change. The cost ofinstallation is higher as compared to other access control system. 2.0 Fingerprint recognition vs Face recognition as biometric authenticationmechanism 2.1 Is Fingerprint recognition better Fingerprint recognition refers to the automated method to verify match the humanfingerprints. The fingerprint of human is scanned electronically and there is creation of referencetemplate. This type of template is created by pattern of fingerprint and image of the fingerprint. Itis considered as the best biometric authentication mechanism as it is distinctive for individualperson (Bowyer and Burge 2016). It is better than any other biometric authorization mechanism
Security Assignment: Fingerprinting vs Face Recognition_4
4FINGERPRINTING VS FACE RECOGNITIONas over 140 years, no two of the fingerprints are seen as alike, not the fingerprints of identicaltwins. The system requires clean hand to take the fingerprint of people. The examples of itsapplication include of mobile phones, car doors, military applications and others (Ghiass et al.2014). Fingerprint is made up of ridges, furrows where its uniqueness is being determined bypatterns made by ridges and furrows. The ridge of fingerprint will never changed in the entirelife of individual. The images of fingerprint are acquired by use of various sensors. Examples are suchcapacitive sensor which gets pixel value based on characteristics of fingerprint. Thecharacteristics of fingerprint are finger ridge (Jain et al. 2015). In same way, optical sensors areused of prisms in order to detect changes into reflectance of light by characteristics. The thermalscanners into the system are used to measure differences into the temperature over time forcreating digital images. 2.2 Is Face recognition better Like fingerprint recognition, face recognition technology measures and equals withdistinctive characteristics of the identification and biometric authentication purposes. Thebiometric can detect the face into images and equivalent them against accumulated templatesinto the database (Shekhar et al. 2014). The system analyzes precise characteristics which arecommon to everyone’s face. It analyzes the distance between eyes, width of nose, chin, place ofcheekbones and jaw line. Those quantities are combined into single code which is used toidentify the person. The system measures distance between the human and digital camera andthen the data are stored into database (Yuan, Sun and Lv 2016). It captures huge images in quitea second, compare the image with the stored data and then the results are produced.
Security Assignment: Fingerprinting vs Face Recognition_5
5FINGERPRINTING VS FACE RECOGNITION2.3 Fingerprint identification processAcquire biometric sample: The person steps the finger on the biometric device eitherthumb or any other finger. Once the device captures the information, it creates electronicrepresentation of the person which is used later on the verification process. The device capturesthe fingerprint by use of various sensors such as optical scanner (Gudavalli, Kumar and Raju2015). The scanner is consisted of charge coupled device that contains of light sensitive diodes.It provides electric signals at elimination. The tiny dots represented the light which hits the spot.Those spots are recorded as pixels and that array of pixels form image. Feature extraction: The person presents the fingerprint on the biometric device such thatthe device can capture the image of unique finger (Ding and Tao 2016). The system extracts thedetails from the processed image and then compared it with the stored image into the system. Matching: After capturing of the image, the device matches the fingerprint image with itsdatabase data. When the image is matched, then it pulls template from the database from where itstress and grants access if it matches (Paone et al. 2014). If it is not matched, then it deniesentering the person due to unrecognized fingerprint.
Security Assignment: Fingerprinting vs Face Recognition_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(Solved) Biometric Technology: PDF
|4
|767
|21

Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management
|10
|2170
|121

Smart Home Automation by Biometrics Assessment 2022
|14
|798
|8

Biometric Systems, Privacy Enhancing Technologies and Wireless Sensor Networks
|11
|2471
|380

Fingerprint Based Bank Locker System
|13
|3112
|26

Assignment | PASSWORD AUTHENTICATION PROTOCOL.
|5
|806
|17