logo

Research on Types of Biometric Systems

12 Pages2874 Words127 Views
   

Added on  2020-05-28

Research on Types of Biometric Systems

   Added on 2020-05-28

ShareRelated Documents
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor’s Note:
Research on Types of Biometric Systems_1
1IT RISK MANAGEMENTTable of ContentsQuestion 1..................................................................................................................................2Question 2..................................................................................................................................7Question 3..................................................................................................................................8References................................................................................................................................10
Research on Types of Biometric Systems_2
2IT RISK MANAGEMENTQuestion 1Research into the different types of biometric systems, which are currently available foraccess control systems. Briefly describe the techniques and technologies used for each typeand discuss the advantages and disadvantages for the three types below. Give an exampleapplication when each type could be used: Palm print, Face recognition and Gaitrecognition.Answer: A specific biometric system is the technological system, which usually utilizesinformation regarding any particular person for his/her unique identification. This biometricsystem always relies on data or information regarding all the unique biological characteristicsfor working effectively (Rigas, Economou & Fotopoulos, 2012). The biometric systemsalways include the running data with the help of algorithms for any typical outcome that issolely related to the unique identification of the user. Biometrics is the technical terms for alltypes of calculations and measurements of body. This system of biometrics is completelyrelated to the characteristics of human beings. The biometrics authentication or the realisticauthentication is utilized for the identification of any human being (Cappelli, Ferrara & Maio,2012). It even helps in the identification of individuals in proper groups, who are taken undersurveillance. The identifiers of the biometric systems are absolutely distinctive andmeasurable features that are utilized for labelling and describing the individuals. They areoften sub divided as physiological and behavioural features. The various physiologicalfeatures of a human being mainly include fingerprint recognition, hand geometry, facerecognition, voice recognition, retina recognition, palm veins, gait recognition, DNArecognition and many more (Banerjee & Woodard, 2012). The details of the above mentionedbiometric systems are as follows:
Research on Types of Biometric Systems_3
3IT RISK MANAGEMENTi) Fingerprint Recognition: This is the most basic system in biometrics. Each andevery person has their own biological trait and fingerprint. Therefore, two persons cannothave the same fingerprint. Thus, recognition of the fingerprint can be undertaken as the mostsecured system of biometrics and unique identification. A fingerprint within the narrow logicis nothing but an impression that is eventually left by all thefriction edgesof any specificfinger of a humanbeing (Banerjee & Woodard, 2012). The steps that are utilized in theidentification of the fingerprint mainly include image acquisition, image enhancement,feature extraction and pattern recognition. The image acquisition is done with the help ofvarious sensors. All the captured images are eventually blurred or contain noises. They affectthe quality of the fingerprint image. The image of the fingerprint taken always varies by thelocation where the finger is placed, the direction and even the stretching degree. The secondstep is the image enhancement (Bringer, Chabanne & Patey, 2013). Most of the time, theimage is corrupted through several types of noises like holes, smudges and creases. Theimage of the fingerprint is enhanced in this particular step. The third step is the featureextraction. Every fingerprint is pattern has various kinds of features. These typical features ofthe fingerprint are extracted in this step. The final step is the pattern recognition. A pattern isthe proper collection of the descriptors (Rigas, Economou & Fotopoulos, 2012). This patternis featured by the elements order, rather than through the intrinsic nature of all the elements.The recognition of pattern is sub divided into two distinct parts, like the Decision theoreticand Structural. The Decision theoretic part mostly deals with all the patterns that aredescribed by utilizing quantitative descriptors like area, texture and length. The category ofstructural mainly deals with the patterns that are described by the utilization of qualitativedescriptors (Cappelli, Ferrara & Maio, 2012). The two methods or techniques that are utilizedin fingerprint recognition are as follows:
Research on Types of Biometric Systems_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management - Assignment
|10
|1985
|53

Assignment Risk Management | Bio-metric System
|11
|2398
|43

Advantage of Face Recognition Technique
|8
|1277
|58

BIOMETRIC VERIFICATION.
|3
|388
|88

Biometric in Secured e-Transaction
|5
|824
|421

Types of Biometric Systems, PETs and Threats for WSN
|15
|3052
|91