logo

IT Risk Management: Types of Biometric Systems, PETs and WSN Threats

   

Added on  2023-06-08

13 Pages2579 Words143 Views
Running head: IT RISK MANAGEMENT
IT Risk Management
Name of the Student
Name of the University
Author’s Note:
IT Risk Management: Types of Biometric Systems, PETs and WSN Threats_1
1IT RISK MANAGEMENT
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................7
Question 3..................................................................................................................................9
References................................................................................................................................11
IT Risk Management: Types of Biometric Systems, PETs and WSN Threats_2
2IT RISK MANAGEMENT
Question 1
Various Types of the Biometric System
The various kinds of the biometric authentication system are given below:
i) Face Recognition Systems: The most significant kind of the biometric system is
the respective face recognition system that helps in the verification or better identification of
the person from several digital images, by the analysis or comparison of the patterns (Anisi et
al., 2017).
The few techniques that are utilized for the face recognition system are given below:
a) Geometry Based: The most important technique for this particular face recognition
system is geometry based. The few relative poses as well as edge detection could be easily
done with the technique. Eyes, nose and mouth are considered while matching the faces.
b) Feature Based: The next technique of face recognition system is the feature based
system (Zhao, Yu & Leung, 2015). The lips, nose and eyes are utilized as the specific
predominant features to find the correct face.
ii) Fingerprint Recognition Systems: This particular kind of biometric system takes
the images of the fingerprints of that specific person and then records the features like the
arches, whorls and loops by taking the outlines of minutiae, edge and furrow.
The few techniques that are utilized for the fingerprint recognition system are as
follows:
a) Correlation: The most popular and significant technique for fingerprint recognition
is correlation, which eventually overlays two distinct fingerprint images with a proper
association in equivalent pixels (Meng et al., 2016).
IT Risk Management: Types of Biometric Systems, PETs and WSN Threats_3
3IT RISK MANAGEMENT
b) Minutiae: The next technique of fingerprint recognition is minutiae that
significantly store the plane only after the inclusion of point set in the I/O minutiae.
iii) Voice Recognition System: The third important and significant kind of the
biometric authentication system is the voice recognition system (Lei et al., 2013). This
particular system is used to produce the speech pattern by the simple combination of
behavioural and the physiological factors. All of the behavioural and the physiological factors
are subsequently captured by the processing of the speech technology.
The few techniques that are utilized for the voice recognition system are as follows:
a) Automated Detection of Voice Signals: This particular technique is responsible for
automatically detecting the several voice signals.
b) Feature Extraction: The second technique of voice recognition system is
responsible for extracting the voice features of that particular individual (Jiang, Xu & Lv,
2016).
iv) Iris Recognition System: Another significant type of the biometric authentication
system is the iris recognition system. The proper verification of individuals that is done based
on single patterns in the ring shaped regions within the pupil of the eyes. The eye colours are
also checked in this system.
The few techniques that are utilized for the iris recognition system are as follows:
a) Normalization: The first technique of this typical iris recognition system is
normalization (Kumar, Sivalingam & Kumar, 2013). Here, the specific remapping is
promptly done of iris region with the significant normalized and non centric polarized
representations.
IT Risk Management: Types of Biometric Systems, PETs and WSN Threats_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Types of Biometric Systems, PETs and Threats for WSN
|15
|3052
|91

The Evolution of Biometrics | Capitol Technology
|5
|707
|22

BIOMETRIC VERIFICATION.
|3
|388
|88

Risk Management: Biometric Methods, PETs, and WSN Threats
|12
|2839
|231

(Solved) Biometric Technology: PDF
|4
|767
|21

Biometric Systems, Privacy Enhancing Technologies and Wireless Sensor Networks
|11
|2471
|380