Information Technology Report: Analysis of Biometric Security Systems

Verified

Added on  2023/03/31

|21
|878
|114
Report
AI Summary
This report provides a comprehensive overview of biometric security, exploring various aspects such as its implementation, the different types of biometric scanners available (including USB fingerprint devices, keyboard fingerprint devices, fingerprint scanners with card readers, and car fingerprint scanners), and the processes involved in their operation. The report details the steps in fingerprint scanning, face recognition, and hand geometry identification, highlighting the advantages and disadvantages of biometric security systems. It also includes user reviews of different devices and concludes with recommendations for the use of biometric security in various settings to enhance safety and reduce the risk of theft. The report emphasizes the role of ICT in providing reliable security devices and suggests considering backups due to the inherent limitations in accuracy of these systems. References to relevant sources support the analysis.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Information
Technology
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTRODUCTION
Biometric consists of two words 'bio' means life and
metrics which means 'metrikos'.
Biometric-security is used for the purpose of
identification and verification of individual.
For the purpose of identification different biological
traits are considered.
Document Page
Implementation of Biometric Security
Biometric-security can be implemented in any device by
installing the software and providing scanner as an
additional hardware to provide input device.
Then comparison between provided input and store data
takes places on the basis of that locking and unlocking
depends.
Document Page
Steps involved in investigation
The investigation process of biometric- fingerprint scanner
depends on three stages such as:
Image enhancement
Minutiae extraction
Minutiae matching
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Image Enhancement
Under this methodology image is capture and processed
through algorithm. Stages of algorithm are mentioned
below.
Normalization
Local orientation estimation
Local frequency estimation
Region mask identification
Filtering
Document Page
Minutiae extraction & matching
The process of minutiae extraction convert image into
binary formate and then compare with other adjacent
pixels in order to produce considerable output image.
In the process of minutiae matching comparison of
image takes place between the image in database and
input one.
Document Page
Types of fingerprint scanner
They are described on the basis of technologies and
properties such as mentioned below:
USB fingerprint devices: They can be attached through
USB port and available at cost of 77.77 pound.
Keyboard fingerprint devices: They are attached with
keyboard and provide security to user. They are
available at price of 124.40 pound.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cont....
Fingerprint scanner and card reader: they are provided in
the combination of scanner and card reader at the price
of 31.03 pound.
Car fingerprint scanner: This is considered as new
feature of auto mobiles and available at the price of
27686120.00 pounds.
Document Page
Reviews of device
USB Fingerprint Device: On the basis of users review.
This device is useful for individual as well as businesses
for security purpose. As they are provided with USB so
they provide easy installation interface to users. And
also provided at considerable price.
Keyboard Fingerprint Device: On the basis of users
review. This reduces the chances of data lost and stole
from individuals device.
Document Page
Cont...
Fingerprint Scanner and card reader: On the basis of
users review the price of product is affordable along
with this it is portable and mobile.
Car Fingerprint Scanner: On the basis of users review
this decreases the chances of car stolen and also give
ride of carrying keys.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Steps involved in face recognition system
identification process:
In order to recognition face using biometric-security devices
following process. Under this input is provided in the form
of image which is being capture by any scanner that is
present into device through this image is stored for face
detection.
Document Page
Cont...
On the basis of that training and evaluation of image
take place. If result generated by detection process
and image stored into database both are same then
only unlocking process of device takes place.
Document Page
Steps involved in hand geometry
identification process
In this process of identification image is capture by
camera plant into device. On the basis of that pre-
processing of image takes on the basis of pre-
processing result feature extraction process of
image takes place after this stage.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cont...
By applying certain algorithm on image matching takes
place. If result generated by detection process and image
stored into database both are same then only unlocking
process of device takes place.
Document Page
RECOMMENDATIONS
On the basis of security features that are provided by
these devices, biometric-security can be considered
for security purpose. I would like to recommend
these devices in order to ensure safety and security
of home, office or any other place. This can reduce
risk at make the property safe from any kind of theft
and stolen of thing.
Document Page
Cont...
By using various devices such as fingerprint, face
recognisance and hand geometry security different
layers of security can be created. Along with this
there are some drawback of these as no machine
can provide 100% accuracy. Due to this user should
always consider certain backups.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Advantages of Biometrics security
As the process involve identification through
biological traits therefore level of security
automatically get improved.
As customers are not require to remember password
and codes which improves their experience.
Document Page
Disadvantages of Biometrics
security
The main disadvantage of using biometric security is it
is not 100% secure.
Secondly, it requires additional hardware such as
scanner, camera etc.
Document Page
Conclusion
On the basis of above presentation the following conclusion
drawn:
ICT is used to provide reliable and safe devices to
business and industries.
Biometric security devices are produced by ICT.
They use to provide security by using biological traits.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Devaraj, S., Ow, T.T. and Kohli, R., 2013. Examining the impact of information
technology and patient flow on healthcare performance: A Theory of Swift and
Even Flow (TSEF) perspective. Journal of Operations Management. 31(4).
pp.181-192.
Han, K. and Mithas, S., 2013. Information technology outsourcing and non-IT
operating costs: An empirical investigation. Mis Quarterly. 37(1). pp.315-331.
Ingebrigtsen, T., Georgiou, A and et.al., 2014. The impact of clinical leadership
on health information technology adoption: systematic review. International
journal of medical informatics. 83(6). pp.393-405.
Document Page
THANK YOU
chevron_up_icon
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]