Introduction
Sareen (2014) describes biometrics as the technology or the science that determines and assesses biological data. Biometrics is measurable behavioral and physiological characteristics applicable in the verification process of people’s identity (Sareen, 2014). In layman terms biometrics may be understood as a science that involves measuring behavioral and physical characteristics unique to an individual (Xiao, 2007). Biometrics verifies that any person is who they claim to be. The term biometrics refers to life measurements although the terms have been associated with the unique physiological qualities used in identifying a person. Biometric applications are often associated with security. However, the identification of the unique human characteristics scientifically has broader meaning and relevance bearing in mind that computer interface has become increasingly natural (Sareen, 2014).
Jaiswal (2011) describes biometric as any robust, measurable, physical, and distinctive personal traits or characteristic of individuals usable in their identification or verification of their claimed identities. There are two categories of biometrics as described by Sareen (2014) i.e. physical and behavioral biometrics. Behavioral biometrics can be defined as a biometric that evaluates naturally acquired characteristics over some time. Behavioral biometrics is used for verification purposes (Jaiswal, 2011). Physical biometric is used for the measurement of intrinsic physical traits of individuals and can be employed for verification and identification (Xiao, 2007).
How Biometrics Work
Notwithstanding the scheme of use of any biometric, all of them have to be processed in the same way. The biometric capturing process involves capturing, processing, and finally comparison. In capturing, the biometric scheme is utilized in the capturing of physiological and behavioral features (Jaiswal, 2011). In processing, the captured behavioral or physical features are processed in order to derive the unique identifiers that correspond to the individual person alone. In comparison, the individual will then be enrolled into the system as the user who is authorized. In the comparison process, the captured image will be checked against the current unique identifying elements. The newly captured elements are the detailed used for authorizing the user. Upon completion of the entire journey of biometric capturing, processing, comparison, the stored data is then applied for future comparison (Jaiswal, 2011).
Having knowledge of the person with whom a conversation is being undertaken is fundamental in the process of human interaction. Computers are expected to integrate these capabilities in future. There are several biometric traits that have been cultivated and employed for...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now