Introduction:
In today's digital economy, many important activities are carried out with the help of computers. The need for reliable, simple, flexible and secure systems is an important issue and a challenging issue for organizations. Increasing security vulnerabilities and transaction fraud are increasing, and the need for security identification and personal authentication technologies is becoming a major concern for organizations. By measuring a person's uniqueness and using it to identify, organizations can greatly improve their security measures. The company's awareness of security issues is rapidly increasing and they want to protect information, which is a huge asset for the company. The organization wants to protect this information from internal or external threats. Security plays a very important role in the organization and makes computer systems safe. Various biometric technologies have been developed. Today, biometrics are a reliable way to identify a person's identity based on physiological or behavioral characteristics. Biometric technology uses humans' unique physical or behavioral practices to validate people. The characteristics of the measurement are face, fingerprint, hand geometry, iris, retina, sound, and the like. Biometric certification is increasingly used in banking, retail, defense, manufacturing, health industry, stock exchanges, public sector, airport security, Internet security and more. Biometrics are providing highly secure identification and personal verification solutions. Biometrics attempts to provide reliable solutions to many challenging and challenging problems. Biometrics technology focuses on analyzing physical or behavioral characteristics that determine an individual's identity. Biometric technology can be used to verify an individual's identity based on measurements and analysis of unique physical and behavioral data. In fact, biometrics are increasingly seen as the preferred method for accurately identifying individuals.
The history of biometrics is not new, it traces its origins in the past. As reported by Portuguese historian Joao de Barros, ancient biometrics were a form of fingerprinting used in China in the 14th century. Chinese businessmen use ink to cover children's palms and footprints on children's paper to distinguish infants. Biometrics Ancient Greek words are a combination of two words - biology means life, and measurement means measurement. It is a study of methods that uniquely identify humans based on physical or behavioral characteristics. Physiological characteristics are fingerprint, face, hand geometry, DNA and iris recognition. Behavior is related to behaviors such as signatures, keystroke studies, speech, and the like. Thus, a biometric system is essentially a pattern recognition system that performs personal identification by determining the authenticity of a particular physiological or behavioral characteristic held by the user. Biometrics are grouped using devices called sensors. These sensors are used to obtain the data needed to verify or identify and convert the data into a digital code. The quality of the device selected to capture the data has a significant impact on the recognition results. These devices may be digital cameras for face recognition, ear recognition, etc. or phones for voice recognition and the like. The biometric system operates in a verification mode or an identification mode. In the verification mode, the system verifies the identity of the person by comparing the captured biometric data with the biometric template stored in the database, and is primarily used for positive identification. In the recognition mode, the system captures the individual's biometric data and searches for biometric templates for all users in the database until no match is found.
Different types of biotechnology
o Facial recognition
The biometric system can automatically recognize people through the face. The technique works by analyzing specific features of the face, such as the distance between the eyes, the width of the nose, the position of the tibia, the chin line, the chin, the unique shape, the pattern, and so on. These systems include measuring eye, nose, mouth, and other facial features. To improve accuracy, these systems also measure the movement of the mouth and lips. Face recognition captures features of a face from a video or still image and converts the unique features of the face into a set of numbers. The data collected from the face is combined in a single unit that uniquely identifies each person. Sometimes, the characteristics of the face are analyzed, like the continuous change of the face when smiling, crying or reacting to different situations. Take into account the entire face of the person or consider different parts of the body. This is a highly complex technology. Capture data using video or thermal imaging. Confirm the user's identity by viewing the screen. The main benefit of using facial recognition as a biometric identity verifier is that people are recognized for presenting their face for identification, rather than an identity card or photo ID, and this technique will be useful for identifying a person. As people undergo plastic surgery in the face of age or human changes, in this case, the facial recognition algorithm should measure the relative position of the ears, nose, eyes and other facial features.
o Hand geometry:
Hand geometry is a technique that captures the physical characteristics of the user's hands and fingers. It analyzes the ridged end of the finger image formed by the ridge, bifurcation or branching. These systems measure and record the length, width, thickness and surface area of an individual's hand. It is used for applications such as access control and attendance. It is easy to use, reliable, inexpensive and widely accepted. The camera captures a three-dimensional image of the hand. Create a validation template and store it in the database and compare it to the template as it is verified. Fingerprint recognition. Currently, fingerprint readers are built into computer memory cards for use in laptops or PCs as well as cellular phones and personal digital assistants. It has been successfully implemented in the field of physical access control.
o Eye recognition:
This technique involves scanning the retina and iris in the eye. Retinal scanning technology maps the capillary pattern of the retina, which is a thin nerve at the back of the eye. Retinal scans measure patterns over 400 points. It analyzes the iris of the eye, which is the colored tissue ring around the pupil of the eye. This is a very mature technology and has a good track record in many applications. Retinal scan captures the unique vascular pattern of the iris that captures the iris. The user must focus on one point, and when it is in that position, the system uses a beam of light to capture unique retinal features. It is very safe and accurate and is used in large quantities in a controlled environment. However, it is expensive, safe, and requires perfect alignment, and typically the user must view the device at the appropriate concentration. Iris recognition is one of the most reliable methods of biometric identification and verification. It is used for travel at airports. Retina scans are used for military and government organizations. The organization primarily uses retinal scanning for authentication in high-end security applications to control access only to authorized personnel, such as in government buildings, military operations, or other restricted areas. The unique patterns and features of the human iris remain the same throughout life, and no two people in the world can have the same iris pattern.
o Voice biometrics
Speech biometric technology that uses the human voice to verify or identify the person. It verifies and identifies the speaker. A microphone on a standard PC with software is needed to analyze the unique characteristics of the person. Primarily used for phone-based applications. Voice verification is easy to use and does not require extensive user training. To register, the user speaks the given passphrase to the microphone or handset. The system then creates a template based on a number of features, including the pitch, pitch, and shape of the throat. Usually, the registration process takes less than a minute to complete. Speech verification is one of the least invasive methods of all biometric methods. In addition, voice verification is easy to use and does not require a lot of user education.
o signature verification
Signature verification technology is an analysis of an individual's written signature, including the speed, acceleration, stroke length, and pressure applied during the signature. There are different ways to capture data for analysis, that is, you can use a special pen to identify and analyze different movements when writing a signature, and then capture the data in the pen. Information can also be captured on a special tablet that measures time, pressure, acceleration and the duration of the pen's contact with it. However, the individual's signature may change over time, which may result in the system not recognizing the authorized user. Signature systems such as special tablets, special pens, etc. are rarely used on devices. When the user signs on the electronic pad, instead of just comparing the signatures, the device compares the direction, speed and pressure at which the writing instrument moves. pad.
o keystroke
This method involves everyone having her / ...
Orignal From: Biometrics - Improving safety standards for high-performance businesses
No comments:
Post a Comment