Verified Document

Biometrics Term Paper

(Kanade; Jain; Ratha, 4, 12) Retina person can be identified from his retina by evaluating the picture of the blood vessels behind the eyes. These blood vessels are called choroidal vasculature. While taking the picture of the retina using infrared rays, the retina is not clearly seen. But certain equipments catch a glimpse of the visual spectrum that assists the evaluation of the retina. The exclusive model of the blood vessels is the identifying factor in a retina. (Bolle, 53) it is not the same even in the case of twins. (U.S. General Accounting Office (a), 27) EyeDentify equipments used to verify retina can check almost three thousand people. Verification of around 1500 people may be conducted in less than five seconds by this equipment. This equipment however cannot capture the image of individuals who has poor vision or severe astigmation. The person under question should be placed near the equipment to get a good picture. This is a costly method to identify retina in comparison to other method of biometric verification. An important aspect of identification through retina is the permanent condition of the retina unless it undergoes a change due to severe mishap. This is a reliable method because a person cannot fix an artificial retina into the eyes. Besides the use of EyeDentify equipment, recent inventions has lead to capture the retina using electromechanical feeler from a close point to learn about its reflective aspects as well as its absorption features. In this method, the retina is first exposed to a 7mW light which enhances the opportunities to know about the model of the veins. One of the disadvantages of the method is the huge price of the feeler. (Bolle, 53)

Another method used to get a picture of the retina is by passing light through the pupil of the eye. The model of the blood vessels is recorded at 400 spots to create a 96 byte model. Identification of a person through retina is employed in important security settings and government buildings. Biometrics using retina is one of the most difficult methods. Ancient techniques required individuals to look at a circling green light for about ten to twelve seconds at a distance of half an inch from the eyes and remain constant. But latest technology requires a person to stay constant only for about 1.5 seconds and the picture of retina can be capture at a distance of about one meter. This method is not sensitive to cataracts, sun glasses or contact lens. Hence it has an edge over the older method. Retina remains the same throughout life, but may undergo a change if a person undergoes glaucoma, high blood pressure, diabetes or AIDS. Though there are latest techniques to identify retina, certain individuals are reluctant to this method since they are exposed to infrared lights. Some people show reluctance since they feel this test would reveal symptoms of illness. Other than EyeDentify, Retinal Technologies is the enterprise which sells equipment to verify retina. (U.S. General Accounting Office (a), 27)

Voice

The identity of a person is cracked down from his voice and speech. The words in a person's speech are classified into several parts called phonemes. Phonemes are distinguished based on the cadence, inflection and its pitch. The voice of a person is interpreted out of these three aspects which are inherited from family, culture and the place of one's living. The accent of a person is influenced by his surroundings. The voice of a person has both behavioral as well as physiological relevance for biometric. Hence our voice...

Parts of this document are hidden

View Full Document
svg-one

An example is the voice of a child and the voice of an adult. Further a person's voice modulates according to the surroundings from where he speaks. This makes voice an important aspect to assess security through biometric. A voice can be recorded either through a telephone or through a computer. A voice recorded through microphone fixed to a computer gives a better quality record for interpretation. Necessary deletion of other voice in the surrounding can be done in this method. (Reid, 110-112)
Modern digital cellular techniques can also be applied to record voice. There are four steps to verify a voice to find identity. They are permanent phrase assessment, permanent vocabulary assessment, flexible vocabulary assessment, text independent assessment. In permanent phrase assessment, the phrase is repeatedly interpreted by using the cadence in the phoneme. When a similar wave is found in the model of the interpreting equipment, the identity of the voice is established. Permanent vocabulary assessment is done using the words repetitively used by the person. The words are translated into digits zero through nine. A repetition of the model created by these digits compared to the person results in finding the match. Flexible vocabulary assessment is conducted in a situation where the person uses a set of words in a given setting for verification. Here the words are compared to a combination of phonemes. While testing for verification the person uses these words and then they are evaluated to find identity. In text independent assessment many words are checked for identity. This is judged as a poor method of verifying voice. The best method of verification can be assessed depending on the level of security in a setting and the ease to handle it. (Reid, 114)

Conclusion

Certification of identity using biometric assessment is gaining momentum in offices and common places to ensure security. Besides, security it is the convenience factor that gives importance to biometric. The details of identity are encrypted to stop duplication in various public facilities. Biometric details are entered into equipment and the embedded software verifies for authentication. Thus, factors like face, iris, retina, voice and fingerprints in a human body which cannot be duplicated, forms the basis for biometric verification.

References

Bolle, Ruud. Guide to Biometrics.

Springer, 2004.

Jain, L.C. Intelligent Biometric Techniques in Fingerprint and Face Recognition. CRC Press.

Kanade, Takeo; Jain, Anil K; Ratha, Nalini Kanta. Audio- and Video-Based Biometric Person

Authentication. Springer, 2005.

Li, Stan Z. Advances in Biometric Person Authentication: 5th Chinese Conference.

Springer. 2004.

N.A. Biometrics Technology. http://et.wcu.edu/aidc/BioWebPages/Biometrics_Technology.html

N.A. What is Biometrics. 10 October, 2006. http://searchsecurity.techtarget.com/sDefinition/0,sid14_gci211666,00.html

Reid, Paul. Biometrics for Network Security.

Prentice Hall PTR. 2003.

U.S. General Accounting Office (a). National preparedness technologies to secure federal buildings. DIANE Publishing. 2002.

U.S. General Accounting Office (b). Technology assessment using biometrics for border security. DIANE Publishing. 2002b.

Zhang, David. Biometric Solutions for Authentication in an E-world.

Springer, 2002.

Sources used in this document:
References

Bolle, Ruud. Guide to Biometrics.

Springer, 2004.

Jain, L.C. Intelligent Biometric Techniques in Fingerprint and Face Recognition. CRC Press.

Kanade, Takeo; Jain, Anil K; Ratha, Nalini Kanta. Audio- and Video-Based Biometric Person
N.A. Biometrics Technology. http://et.wcu.edu/aidc/BioWebPages/Biometrics_Technology.html
N.A. What is Biometrics. 10 October, 2006. http://searchsecurity.techtarget.com/sDefinition/0,sid14_gci211666,00.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Analyzing the Biometric Technology Phenomenon
Words: 2000 Length: 5 Document Type: Term Paper

Biometric Technology Biometrics are those easily measurable physiological, behavioral or anatomical characteristics, which can be used in identifying an individual. A common biometric modality is fingerprints, but there are others like DNA, voice patterns, irises, facial patterns, and palm prints. Biometrics have been quite beneficial in the last couple of years for law enforcement and intelligence (investigative) purposes, mostly to the FBI and its associates. in the intelligence and law enforcement

Biometric Security in Both the
Words: 1181 Length: 4 Document Type: Term Paper

It also helps to reduce the threat of identity theft as this is frequently initiated through the hacking of such highly vulnerable wireless communication devices. According to ThirdFactor, the same BioLock technology is currently being adapted to meet the needs of the Microsoft Windows and Mac OS packages on the market's near horizon. This suggests that the pacesetting consumer brands in the technology, software, cell phone and computing industries

Biometric Information Systems and Privacy
Words: 1381 Length: 4 Document Type: Essay

The truth of the matter is the biometric templates for identity enrolment that are stored on a server are not in the real since images rather they are mathematical representations of the data points that the biometric algorithm is able to extract from the scanned fingerprint, finger vein, palm vein or iris. The identifying template is a binary file that has a series of zeros and ones. The algorithm then

Biometric Entry and Ignition System
Words: 946 Length: 3 Document Type: Term Paper

However, a very determined criminal, as mentioned above, might go as far as cutting off fingers in order to circumvent this problem. Nonetheless, fingerprinting appears to make car theft somewhat more challenging than the ordinary immobilizing device. Main Conclusions Because of its groundbreaking technology and the fact that it makes car theft more difficult than ordinary immobilizing devices, biometric fingerprinting devices for immobilizing and car door locking holds particular advantages over

Biometric Payment Trends in Southern
Words: 1644 Length: 6 Document Type: Term Paper

The Homeland Security main division is also located in California. Security, not only in terms of personal banking security but as well home security is an issue in Southern California as evidenced in a February 7, 2007 news report entitled: "Police: Billionaire Robbed by Man Posing as Delivery Person." The report relates a Southern California financier whose home was invaded by a deliveryman. The report states the fact that:

Biometric Optical Technology Retina Biometric
Words: 1338 Length: 5 Document Type: Term Paper

2) False acceptance which is through confusion of one user and another or the acceptance of an invalid individual as being a user that is legitimate. Although the rate of failure is easily adjusted through modifying the threshold through decreasing the rate of failure on the end of rejection or acceptance the increase of failure on the other end of the spectrum increases In the act of choosing equipment with biometric

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now