Biometric Technology Recognition: Challenges and Opportunities
Verified
Added on 2022/12/12
|21
|4467
|336
AI Summary
This report explores the challenges and opportunities of biometric technology recognition. It discusses different biometric solutions for security purposes, their advantages and disadvantages, and the application fields that use biometric technology. The report also addresses research questions related to biometric technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: PROJECT PROPOSAL Project Proposal Name of Student- Name of University- Author’s Note-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1PROJECT PROPOSAL Title- Biometric Technology Recognition: Their Challenges and Opportunities Abstract The organizations mainly search for more methods of authentication that are secured for accessing, e-commerce as well as includes some other application security. For this reason biometrics is now a days increasing its attention in the organizations. But, there always remains a doubt whether to use biometric in the organization or not. And if decided, the company gets confused about which biometric to choose and which is the best technology of biometric for them to use. There are different applications of biometric that are used in an organization. Biometrics is considered as the automated recognition of the individuals that are based on behavioural characteristics and the biological characteristics. Biometric is a particular tool that helps to establish the confidence of a particular individual. This report deals with the details of the biometric use and different types of biometric that an organization uses. This report also states advantages as well as disadvantages that are discussed in this report below.
2PROJECT PROPOSAL Table of Contents Title..................................................................................................................................................1 1. Introduction..................................................................................................................................4 2. Research Questions......................................................................................................................5 3. Literature Review........................................................................................................................5 3.1 Positive and Negative Recognition........................................................................................5 3.2 Application Fields included in Biometrics Technology........................................................6 3.3 Biometric Solutions for Security Purpose.............................................................................7 3.5 Advantages and Disadvantages of Biometrics Security System...........................................8 4. Research Methodologies............................................................................................................10 4. 1. Analysing the sources of information................................................................................10 4.2. Research method.................................................................................................................10 4.3 Data collection or systems design methods.........................................................................11 4.4 Ethical Considerations.........................................................................................................11 5. Detailed Project Plan.................................................................................................................12 6. Conclusion.................................................................................................................................13 7. References..................................................................................................................................15 8. Appendices................................................................................................................................18 9. Ethical Consideration.................................................................................................................20
3PROJECT PROPOSAL
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4PROJECT PROPOSAL 1. Introduction Theconceptofbiometricdealswithuniquephysicalaswellasbehavioural characteristics that helps to recognize the identity of the individual and authenticate the identity of the individual (Vazquez-Fernandez and Gonzalez-Jimenez 2016). There are common physical biometrics that includes fingerprints, retina, facial, and palm and geometry characteristics. For thesecurityofanorganization,theorganizationsmainlyusesthreedifferenttypeof authentication. The credentials that are known that is a PIN, a password or some personal information that are included. The credentials that are needed that is a smart card, token like SecureID card or card key. Something that is related to an individual that is biometric. From all the above stated security authentication, biometric is one the most important as well as secured. Biometric authentication cannot be borrowed, forgotten or can be stolen. Forging thebiometricdataisnot possiblepractically.Thebehaviouralcharacteristicsin biometric includes signature, the voice, gait as well as the keystroke pattern used in an organization. From all the biometric technologies, signature is one of the most developed technology that are used for authentication. Different from tokens or systems that are based on password based, the system of biometric functions without particular input, knowledge or the user cooperation that includes the recognition includes in authentication (Mitchell and Shing 2018). The system of biometric is considered as a general replacement for all other authentication technologies. Combination of the
5PROJECT PROPOSAL approaches of a biometric with some other methods does not includes much security which does not include user cooperation that are included. 2. Research Questions The research questions that this research paper addresses are listed below: 1.What are the biometric solutions that are used for security purposes of authentication? 2.What are the fields that uses biometric technology for its security purposes? 3.What are the opportunities and drawbacks of using biometric technology? 3. Literature Review 3.1 Positive and Negative Recognition As stated by Chandyet al.(2017), there are possible two kinds of applications in biometrics that can be established. One is negative recognition and the other is positive recognition. Both of these recognitions are explained below: Positive recognition: The applications that does not require the users to give its identity fortheconveniencecomesunderthisgroup.Theprocessofidentificationrequiresless operations compared to the verification of the user and the identification process is easy to operate. The verification of identity is mainly used in the place of positive recognition (Alsaadi 2015). The operation mode of positive recognition is very interesting and the user might be interested to be recognized. This process of recognition is positive. If recognition is not done, the attempt of the individual will be rejected. Negative recognition: Negative recognition mainly includes a system to establish if a person denies of being that person (Mahadiet al.2018). The main purpose of including the
6PROJECT PROPOSAL negative recognition helps to prevent a particular person from using multiple identities. The methods of classical recognition can provide this particular type of recognition. The biometrics can be used for negative recognition. The applications of government as well as forensics mainly belongs to this particular group where the users is not identified and is not collaborative. 3.2 Application Fields included in Biometrics Technology As stated by Haupt and Mozer (2015), the physical control of access mainly refers to all the processes that includes the physical characteristics. The control of logical access mainly includes schemes, techniques, as well as procedures that are used in the biometric system. There are many difference between the control of physical access as well as control of logical access. Physical Access Control: This control mainly covers the authentication process of identity that requires all the users to include the physical characteristics. This is mainly used in location which needs high security such as military, police stations, and the hospitals. The common use of physical control access are the application that are applied in computers or at doors. These applications are very confidential and is important and include very high level of security. The physical access mainly helps to reduce the problems of human related risks. Logical Access Control: the logical access is mainly a process that includes a scheme control that refers to a particular process to control the scheme containing the data files or the computer programs (Masuphaet al.2015). The logical access contains personal as well as privacy information that includes different users. This technology is mainly used by the military as well as governments for protecting the data for having high security using the technology of biometric.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7PROJECT PROPOSAL The difference between logical access and the physical access is that the logical access is mainly used for computer networks as well as controlling of the systems. This helps to reduce the complexity of the requirements of using passwords for the users. 3.3 Biometric Solutions for Security Purpose Facial Recognition: The human face recognition is the earliest characteristics that are to be used as biometric system for securing the identity of a user.For the technology of facial recognition, it is widely used because there is no need of using any type of physical contact between the device and the users (Saifanet al.2016). The cameras helps to scan the face of the users and matches the data with the database for identification and verification. It is very easy to install as well as it requires expensive hardware. The technology of facial recognition is widely used in different types of security systems that includes physical controlling access as well as computer accounts of users. The negative factor that is included with the technology of facial recognition includes with the user ages, the facial recognition of the user will change over the time. Fingerprint reader: There are number of ridges in the fingerprints of the users and the valleys are also present in the surface of the finger which are unique for identifying each human. The ridges of the fingers forms main points, the ridges ending where there is the ending of the ridges, the ridges bifurcations which includes ridges to split in two parts. The unique point of the fingerprint is determining the different types of patterns of the ridges and the furrows and includes minutiae points.There are basically five basic patterns that are included in a fingerprint. However, this fingerprint technique also has many disadvantages in a system. If the fingerprint gets damaged due to some accident or some marks on the surface, it becomes very
8PROJECT PROPOSAL difficult for identify (Zapataet al.2017). The system mainly requires finger surface of the users so that they might have a minutiae or some pattern so that the patterns matches. There is a limitation factor for the algorithm security in the system. The system of fingerprint security mainly consists of different applications that includes cell phones, the flash drives, the laptops and many other devices. Voice Recognition: For voice recognition, there are mainly two factors for making a voice of human unique; a physiological component which is commonly known as the voice trait and the second is the behavioural component that includes the voice accent. By the combination of all the factors, it is not possible to imitate the voice of other person in an exact manner (Hsiaoet al.2016). Taking the advantages of these factors, the technology of biometrics is created in the system of voice recognition to verify the identification of a person only with their voice. The technology of voice recognition mainly focus on the tract of the voice. This is because it includes a unique characteristics in a physiological trait. This voice recognition works perfectly with the access control for the users. Singh, A. and Chatterjee (2015) stated that this technology also has some disadvantages. These factors affects the quality of a particular system. The performance related with the voice recognition technology allows the users to record the voice on their database is the most important part. The users are mainly asked to have a repeat paraphrase of the voice or some sequence numbers so that the voice of the person is stored accurately. 3.5 Advantages and Disadvantages of Biometrics Security System Advantages
9PROJECT PROPOSAL As stated by Radhika, Jeddy and Nithya (2016), there are many advantages related with the use of biometric in an organization. The first advantage that the biometric system includes of using the new technology as its uniqueness and this is one of the main characteristics that helps the use of biometric technology to become more important in the organizations. With the uniqueness involved in biometric technology, each of the identification of the individual will include effective identification of the users. The chance of having two users using the same identification in technology of biometric security is not possible. Secondly, the biometric is considered as a high secured way for identifying the users that makes technology less addicted for the users for sharing their high sensitive data (Wiercioch, Teufel and Teufel 2016). The users can share the fingerprints, iris as well as allowing the users for accessing the information security. Each constraint that is used during the identification consists of single property that are used by the users. Lastly, the advantage of using the biometric technology is that the data that are related with the biometric cannot be stolen, forgotten, as well as lost. The aspect of the biometric technology mainly makes the technology popular (Padma and Srinivasan 2016). The method of biometric helps to identify as well as give access to the users to make the identification very easy. The system of biometrics security is very easy to install as well as requires very small amount of funding for the equipment. Disadvantages As stated by Meng et al. (2015), there are many flaws that are included in using the biometric system. The applications system of biometric has many weakness that causes many problems for the users. If the system of biometric uses fingerprints for identifying the users, any
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10PROJECT PROPOSAL accident caused with the user might result in loss of the finger. This might face difficulty in verification of the process. For the methods of voice recognition, there is illnesses that might include throat strep which can be hard for the users to access the information (Enamamuet al. 2017). There is another factor that might influence the system of voice recognition with some continuous aging for the users. The noise in the environment can also hamper the voice recognition that helps to identify the users to make the users that are to be identified. According to Shen et al. (2016), for the iris or the rental scanning of the applications, the users might be very intrusive. The users may have concern with their safety of eyes when the iris of the human is scanned for retinal scan. The databases that are used for storing the user identification might be very large which might include a potential threat. For scanning the characteristics of the iris and to store the large amount of the data related, biometrics system used mainly requires new as well as modern technologies. The cost in the equipment is very much expensive. 4. Research Methodologies 4. 1. Analysing the sources of information: All the sources from where the information are taken to carry out this research paper is books, articles, thesis papers, and all the other published materials that are related to the biometrics security in authentication. The information that are mainly included in this research paper is mainly collected from the online library including the Google scholar, as well as the published materials that have a proper title, the publication information and the name of the author (Walliman 2017). For doing the citation, Harvard referencing style is used that will mainly state the authority of all authors, the state of publication related with the journal and the associated with the publisher.
11PROJECT PROPOSAL 4.2. Research method: The research methods that are included with this research paper is quantitative methodology as well as qualitative methodology. The research methods that are included in this research paper is primary research methods and secondary research method. The primary research method includes carrying out interviews and surveys with a particular selected area. For secondary research methods, all qualitative data are collected from different online books and online published books that are related with the research topic (Schoenduweet al. 2015). Both primary method as well as secondary methods are used to carry out the research to evaluate the use of biometric for security purpose. 4.3 Data collection or systems design methods: The method of data collection is basically a method that includes the results of the development process included with the systems (Ding-Masteraet al.2018). The groups that are involved in this process of data collection mainly helps to collect the data related to the topic and is then undertaken as well as analysing the data that are being collected. The method of data collection mainly helps to conduct the research is primary data collection method and secondary research methods. The data that are collected for primary data collection are collected from interview and survey that are being carried out. For carrying out the quantitative methodology, the quantitative data is being analysed that are collected from the survey and the questionnaires that are being carried out. Survey and interview will be held that will be carried out with respondents (Divakar and Arakeri 2018). The respondents included for carrying out the research is employees of three technological companies and interview will be carried out within the managers of the organization. For analysing the qualitativedata,differentjournalsanddifferentarticlesarebeingstudiedthatincludes observations of different authors who have their different views on the related topic.
12PROJECT PROPOSAL 4.4 Ethical Considerations Ethics that are included in this project includes the norms or the standards that are used for conducting the research. The first ethical consideration that are included with this research study is promoting the aim of the research that is being included in the research. Promoting aims of research includes knowledge, truth, as well as avoidance of all the errors that are included. The second ethical consideration that is included in the research often includes good cooperation deal as well as coordination deal in different people having different disciplines as well as institutions. There must be ethical standards for promoting all the values that are needed for collaborative work. The third ethical norm that is included in this research study includes researchers that is accountable for the public. All the federal policies that are included in the research such as misconduct, protection on human subjects, and interest conflicts are to be included by the research in this research report. 5. Detailed Project Plan Task NameDurationStartFinish Project Schedule41 daysMon 11/03/19Mon 6/05/19 Research Proposal15 daysMon 11/03/19Fri 29/03/19 Selection of Topic2 daysMon 11/03/19Tue 12/03/19 Background Research4 daysWed 13/03/19Mon 18/03/19 Project Objective1 dayTue 19/03/19Tue 19/03/19 Literature Review1 dayWed 20/03/19Wed 20/03/19 Research Question and Research Hypothesis3 daysThu 21/03/19Mon 25/03/19 Research Design and Research Methodology2 daysTue 26/03/19Wed 27/03/19 Research Limitations1 dayThu 28/03/19Thu 28/03/19 Preparing Project Schedule1 dayFri 29/03/19Fri 29/03/19 Submission of the Research0 daysFri 29/03/19Fri 29/03/19
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13PROJECT PROPOSAL Proposal Literature Review6 daysMon 1/04/19Mon 8/04/19 Impact of Service quality and the influence of service on customer satisfaction 2 daysMon 1/04/19Tue 2/04/19 Different switching cost as well as alternative evaluation that effects the switching barrier of telecommunication 2 daysWed 3/04/19Thu 4/04/19 Customer satisfaction as well as switching barriers affecting the customer loyalty in the telecommunication industry 2 daysFri 5/04/19Mon 8/04/19 Data Collection Method12 daysTue 9/04/19Wed 24/04/19 Secondary Research2 daysTue 9/04/19Wed 10/04/19 Primary Research3 daysThu 11/04/19Mon 15/04/19 Selecting area or population for data collection1 dayTue 16/04/19Tue 16/04/19 Collection of Data3 daysWed 17/04/19Fri 19/04/19 Analysis of the Collected Data3 daysMon 22/04/19Wed 24/04/19 Draft Submission0 daysWed 24/04/19Wed 24/04/19 Final Project Submission8 daysThu 25/04/19Mon 6/05/19 Detailed Analysis of Findings3 daysThu 25/04/19Mon 29/04/19 Conclusion3 daysTue 30/04/19Thu 2/05/19 Recommendations1 dayFri 3/05/19Fri 3/05/19 Final Submission of Project Report1 dayMon 6/05/19Mon 6/05/19 6. Conclusion From the above report, it can be stated that biometric is one of the most important authentication technique that can be used for security purposes. But along with its advantages, there are many disadvantages that it incorporates in the organization. There are many systems that performs recognition of biometric that exists with a constellation of different authentication, thetechnologiesofidentificationaswellasoffersmanydistinctchallengesaswellas
14PROJECT PROPOSAL capabilities. The authentication of technologies are mainly based on three basic things, one is something that an individual knows including passwords, something that the individual has including token or secure key and some that that an individual is or work that it does. This report states the definition of Positive and Negative Recognition, Application Fields included in Biometrics Technology, biometric solution for security purpose, software used in biometrics security, and also states the advantages and the disadvantages that biometric includes in all organization who uses the concept of biometric in security authentication.
15PROJECT PROPOSAL 7. References Alsaadi,I.M.,2015.PhysiologicalBiometricAuthenticationSystems,Advantages, Disadvantages And Future Development: A Review.International Journal of Scientific & Technology Research,4(12), pp.285-289. Chandy, J.A., Fahrny, J., Haque, A., Wortman, P.A., Karimian, N. and Tehranipoor, F., 2017. Exploring Methods of Authentication for the Internet of Things. InInternet of Things(pp. 71-90). Chapman and Hall/CRC. Ding-Mastera, J., Jing, P., Stinson, M., Manzi, E., Zhao, F., Marzano, V., Cheah, L. and Ben- Akiva, M., 2018.Combining gps data collection with assisted machine learning to enhance freight vehicle and driver surveys: Methodology and demonstration(No. 18-00512). Divakar,M.A.andArakeri,M.P.,2018.UserAuthenticationSystemUsingMultimodal Biometrics and MapReduce. InInformation and Communication Technology for Sustainable Development(pp. 71-82). Springer, Singapore. Enamamu, T.S., Clarke, N., Haskell-Dowland, P. and Li, F., 2017, December. Transparent authentication:Utilisingheartrateforuserauthentication.In201712thInternational Conference for Internet Technology and Secured Transactions (ICITST)(pp. 283-289). IEEE. Haupt, G. and Mozer, T., 2015. Assessing biometric authentication: a holistic approach to accuracy.Biometric Technology Today,2015(3), pp.5-8. Hsiao,C.C.,Wang,S.W.,Lin,R.andLee,R.G.,2016,October.Multiplebiometric authenticationforpersonalidentityusingwearabledevice.In2016IEEEInternational Conference on Systems, Man, and Cybernetics (SMC)(pp. 000673-000678). IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16PROJECT PROPOSAL Mahadi, N.A., Mohamed, M.A., Mohamad, A.I., Makhtar, M., Kadir, M.F.A. and Mamat, M., 2018.Asurveyofmachinelearningtechniquesforbehavioral-basedbiometricuser authentication. InRecent Advances in Cryptography and Network Security. IntechOpen. Masupha, L., Zuva, T., Ngwira, S. and Esan, O., 2015, December. Face recognition techniques, their advantages, disadvantages and performance evaluation. In2015 International Conference on Computing, Communication and Security (ICCCS)(pp. 1-5). IEEE. Meng, W., Wong, D.S., Furnell, S. and Zhou, J., 2015. Surveying the development of biometric userauthenticationonmobilephones.IEEECommunicationsSurveys&Tutorials,17(3), pp.1268-1293. Mitchell, C. and Shing, C.C., 2018, July. Discussing Alternative Login Methods and Their Advantages and Disadvantages. In2018 14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)(pp. 1353-1356). IEEE. Padma, P. and Srinivasan, S., 2016, August. A survey on biometric based authentication in cloud computing.In2016InternationalConferenceonInventiveComputationTechnologies (ICICT)(Vol. 1, pp. 1-5). IEEE. Radhika, T., Jeddy, N. and Nithya, S., 2016. Tongue prints: A novel biometric and potential forensic tool.Journal of forensic dental sciences,8(3), p.117. Saifan, R., Salem, A., Zaidan, D. and Swidan, A., 2016. A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices.Journal of Social Sciences (COES&RJ-JSS),5, pp.29-41.
17PROJECT PROPOSAL Schoenduwe, R., Mueller, M.G., Peters, A. and Lanzendorf, M., 2015. Analysing mobility biographies with the life course calendar: a retrospective survey methodology for longitudinal data collection.Journal of Transport Geography,42, pp.98-109. Shen, S.S., Lin, S.H., Kang, T.H., Chien, W. and Chiu, C.C., 2016, November. A new mobile on-line mutual authentication scheme. In2016 International Conference on Advanced Materials for Science and Engineering (ICAMSE)(pp. 79-81). IEEE. Singh, A. and Chatterjee, K., 2015, March. A secure multi-tier authentication scheme in cloud computing environment. In2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015](pp. 1-7). IEEE. Vazquez-Fernandez, E. and Gonzalez-Jimenez, D., 2016. Face recognition for authentication on mobile devices.Image and Vision Computing,55, pp.31-33. Walliman, N., 2017.Research methods: The basics. Routledge. Wiercioch, A., Teufel, S. and Teufel, B., 2018. The Authentication Dilemma.Journal of Software,13(5), pp.277-287. Zapata, J.C., Duque, C.M., Rojas-Idarraga, Y., Gonzalez, M.E., Guzmán, J.A. and Botero, M.B., 2017, September.Data fusion appliedto biometricidentification–areview. InColombian Conference on Computing(pp. 721-733). Springer, Cham.