Introduction
Sareen (2014) describes biometrics as the technology or the science that determines and assesses biological data. Biometrics is measurable behavioral and physiological characteristics applicable in the verification process of people’s identity (Sareen, 2014). In layman terms biometrics may be understood as a science that involves measuring behavioral and physical characteristics unique to an individual (Xiao, 2007). Biometrics verifies that any person is who they claim to be. The term biometrics refers to life measurements although the terms have been associated with the unique physiological qualities used in identifying a person. Biometric applications are often associated with security. However, the identification of the unique human characteristics scientifically has broader meaning and relevance bearing in mind that computer interface has become increasingly natural (Sareen, 2014).
Jaiswal (2011) describes biometric as any robust, measurable, physical, and distinctive personal traits or characteristic of individuals usable in their identification or verification of their claimed identities. There are two categories of biometrics as described by Sareen (2014) i.e. physical and behavioral biometrics. Behavioral biometrics can be defined as a biometric that evaluates naturally acquired characteristics over some time. Behavioral biometrics is used for verification purposes (Jaiswal, 2011). Physical biometric is used for the measurement of intrinsic physical traits of individuals and can be employed for verification and identification (Xiao, 2007).
How Biometrics Work
Notwithstanding the scheme of use of any biometric, all of them have to be processed in the same way. The biometric capturing process involves capturing, processing, and finally comparison. In capturing, the biometric scheme is utilized in the capturing of physiological and behavioral features (Jaiswal, 2011). In processing, the captured behavioral or physical features are processed in order to derive the unique identifiers that correspond to the individual person alone. In comparison, the individual will then be enrolled into the system as the user who is authorized. In the comparison process, the captured image will be checked against the current unique identifying elements. The newly captured elements are the detailed used for authorizing the user. Upon completion of the entire journey of biometric capturing, processing, comparison, the stored data is then applied for future comparison (Jaiswal, 2011).
Having knowledge of the person with whom a conversation is being undertaken is fundamental in the process of human interaction. Computers are expected to integrate these capabilities in future. There are several biometric traits that have been cultivated and employed for...
Some Key applications are:Physical Acces facility and secure-area access, time-and-attendance monitoring. Growth: Flat, starting at 13% of total market revenues and ending at 14%. Logical Access: PC, networks, mobile devices, kiosks, accounts. Growth: From 21% to 31% of total market revenues. Identity Services: Background check enrollment, credentialing, document issuance. Growth: Decline from 65% to 47% of total market revenues. Surveillance and Monitoring: Time and attendance, watchlists. Growth: From less
In addition to the stability, scalability and extensibility of its architecture, cloud platform have made it possible for workflows across government to become more pervasive and secure as a result [4]. The TCO of a given cloud platform or series of applications therefore has continued to become reduced by the experience effect (comparable to economies of scale yet only applied to data aggregated and knowledge creation) across government [6]. This
Security Technology in Next Five Years Globally security concerns have placed great pressure on the survival of human life and had threatened the daily life, confidence and dignity of societies at large. To resolve the security concerns and overcome with this disastrous obstacles, security technological advancements have been made in many facets. Human life is playing its vital role in moving the world to a secure place where families, businesses,
However, cursory studies that have been conducted are either biased because they seem to present a biased review of certain products or are insufficient because of their limitations and shallowness. Those studies that have been considered to be useful are mentioned below. Robert D. Boerner, Joanne Bourquard, Pam Greenberg (2000) comprehensively elaborates the legal aspect of spam. He provides an in-depth review of the present laws in actions and the
The truth of the matter is the biometric templates for identity enrolment that are stored on a server are not in the real since images rather they are mathematical representations of the data points that the biometric algorithm is able to extract from the scanned fingerprint, finger vein, palm vein or iris. The identifying template is a binary file that has a series of zeros and ones. The algorithm then
attack of 911 has posed a serious threat to the aviation industry. For the first the world could realize that airplanes are not only the mode of transportation but can also be utilized as potential bombs. Many passengers are apprehensive of air travel. This led Governments, Policy Makers, aviation industries and regulatory authorities to think a while about aviation security. The aviation security is being revolutionized since then to
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now