Biometric Verification: Analysis of Authentication Methods Report

Verified

Added on  2023/01/16

|3
|450
|34
Report
AI Summary
This report explores the concept of biometric verification, a technology that uses unique behavioral and physical characteristics for authentication. It explains how biometric authentication works by comparing data, such as that from fingerprint, retina, iris, and speaker recognition systems. The report discusses various biometric authentication methods, including fingerprint scanners, retina scanners, iris scanners, and speaker recognition. It highlights the advantages of biometrics, such as ease of use and cost-effectiveness, while also acknowledging disadvantages like the inability to remotely alter biometric security. The report references relevant studies and provides a comprehensive overview of the subject.
Document Page
Running Head: BIOMETRIC VERIFICATION
BIOMETRIC VERIFICATION
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1BIOMETRIC VERIFICATION
Biometric authentication basically works by using the techniques of comparison. It
compares two different set of data (Al-Maadeed et al., 2016). The first data is presented by
the owner of the device while the second data belong to the visitor. If the two information
matches, then the result comes out that the device knows the visitor as well as the owner and
the person permission to access. The important thing that is to be noted that two biometric
cannot match exactly same. So, if both the biometric is nearly identical then the permission is
granted by the biometric. Popular biometric authentication includes fingerprint scanners, eye
scanners, speaker recognition technique, face scanner and many more. In fingerprint scanner
the scanner takes the photo of the finger, after that it identifies the pattern and at last it
compiles it into a unique identification code (Wrobel et al., 2017). In a retina scanner the
scanner illuminates the complex blood vessels in eye using the infrared light which makes it
visible to the surrounding tissue. The iris scanner will take the photograph of the user’s iris to
capture the necessary details. After collecting the necessary information, the scanner will
convert the data into a certain mathematical code to encrypt it. In case of speaker recognition,
the speaker software will basically break the words into certain packets of different
frequencies commonly known as formants. These formants include a tone of the user by
which it recognizes the voice of the user. The advantages of biometric are such that they are
easy to use, and the users does not require any kind of guidance or teaching in order to use
the technology of biometric. This type of biometric systems is cheap and also unobtrusive.
There are certain disadvantages of biometric as well such as the user cannot alter the
biometric security with the help of a remote.
Document Page
2BIOMETRIC VERIFICATION
References
Al-Maadeed, S., Bourif, M., Bouridane, A., & Jiang, R. (2016). Low-quality facial biometric
verification via dictionary-based random pooling. Pattern Recognition, 52, 238-248.
Wrobel, K., Doroz, R., Porwik, P., Naruniec, J., & Kowalski, M. (2017). Using a
probabilistic neural network for lip-based biometric verification. Engineering
Applications of Artificial Intelligence, 64, 112-127.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]