logo

Biometric Security: Implementation, Investigation, and Types of Devices

   

Added on  2023-03-31

21 Pages878 Words114 Views
Information
Technology

INTRODUCTION
Biometric consists of two words 'bio' means life and
metrics which means 'metrikos'.
Biometric-security is used for the purpose of
identification and verification of individual.
For the purpose of identification different biological
traits are considered.

Implementation of Biometric Security
Biometric-security can be implemented in any device by
installing the software and providing scanner as an
additional hardware to provide input device.
Then comparison between provided input and store data
takes places on the basis of that locking and unlocking
depends.

Steps involved in investigation
The investigation process of biometric- fingerprint scanner
depends on three stages such as:
Image enhancement
Minutiae extraction
Minutiae matching

Image Enhancement
Under this methodology image is capture and processed
through algorithm. Stages of algorithm are mentioned
below.
Normalization
Local orientation estimation
Local frequency estimation
Region mask identification
Filtering

Minutiae extraction & matching
The process of minutiae extraction convert image into
binary formate and then compare with other adjacent
pixels in order to produce considerable output image.
In the process of minutiae matching comparison of
image takes place between the image in database and
input one.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report On Bio-Metric Security
|11
|2339
|140

Security in Devices and Network.
|5
|895
|15

Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management
|10
|2170
|121

Face Recognition Assignment PDF
|16
|3863
|264