0% found this document useful (0 votes)
97 views6 pages

Overview of Biometric Systems

This document discusses biometric systems for identity verification and authentication. It defines biometrics as measurable physical characteristics that can uniquely identify an individual. Biometric data can include fingerprints, facial features, DNA, voiceprints, and retinal scans. The document outlines the three main components of biometric systems: enrollment, template creation, and matching. It also addresses privacy and ethical concerns regarding the storage and use of biometric data, and argues that with proper security and transparency measures, biometric technologies can enhance privacy while providing accurate identity verification.

Uploaded by

dons
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views6 pages

Overview of Biometric Systems

This document discusses biometric systems for identity verification and authentication. It defines biometrics as measurable physical characteristics that can uniquely identify an individual. Biometric data can include fingerprints, facial features, DNA, voiceprints, and retinal scans. The document outlines the three main components of biometric systems: enrollment, template creation, and matching. It also addresses privacy and ethical concerns regarding the storage and use of biometric data, and argues that with proper security and transparency measures, biometric technologies can enhance privacy while providing accurate identity verification.

Uploaded by

dons
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Running head: Biometric 1

Biometric

Students Name

University Affiliation
Biometric 2

A biometric is an identity and verification mechanism that is measurable, robust and

distinctive in order to get the physical characteristic of an individual. This technology is mainly

applied in the identification process and access control of people where surveillance is used.

Biometric is based on an authentication where an individual may be recognized by his/her

natural corporeal attributes. Biometric identifiers can be grouped as either physiological

characteristics or behavioral characteristics. Physiological features that are used in biometric

authentication involves the issues of fingerprints, DNA, face or ear features (Blaul, 2013). For

the case of behavioral characteristics, they require the pattern of an individual for instance typing

rhythm, gait, gestures, and voice. These physical traits can be measured by sensors and changed

into a quantifiable digital form, As a result, allowing it to be easily automated. This mechanism

of biometric is considered to be robust since it can measure the characteristic of an individual

considering the changes that take place with respect to time. This paper will focus on the various

types of biometric systems, different implementations used in the biometric system and the moral

used in biometric systems plus the privacy matters related to the biometric systems (Blaul, 2013).

This system is considered as an easier technology to use in authentication situation since

it offers an improvised reliability and has a strengthened data delivery capacity. It has has a high

level of accuracy with almost 100% accuracy when matching the biometric data against an

extensive database that is available in the system .Biometric is considered as one of the secure

systems since it is based on traits that are freakish and permanents and challenging to replicate

owing to the approaches in the technology data transmission security and biometric wrenching

tools. There are various types of biometrics system. Firstly it involves the technology of DNA

matching which is a chemical biometric system where it identifies an individual trait using the

analysis of segments of the DNA. Secondly the Visual biometric is used to identify a person by
Biometric 3

verification from the shape of the ear. Face recognition is another visual biometric where it

analysis the facial characteristics pattern of a person for the authentication. Most face recognition

systems usually use Eigen faces features to reports the identity of an individual. Another

biometric system involves the signature recognition whereby the authentication of a person is

identified by the review his/her manuscript style, in particular, the name. In this system, there are

two fundamental models of digitally transcribed signature authentication which entail the static

and dynamic. Lastly auditory biometric it involves the identification the speaker identity of an

individual. Whereby the system matches the different voice views in the database with a

particular voice of a person to identify him/her (Blaul, 2013).

During the implementation of a biometric, there are three elements that system has to

contain to be fully operational. Firstly the system should consist the enrollment process.

Secondly, the system should include the templates. Lastly, it should have a matching process

which is used to compare a live biometric representation corresponding to one or many models

in the memory. Focusing on the enrollment, it is considered as one of the critical first stages of

the process of authentication since at this stage it is where the templates that will be used for the

subsequent steps are based on. Typically the system usually takes at least three representations of

the identical biometric and equates them to generate an enrollment template. This stage is very

sensitive in that it responds to the environmental changes as a result during the process of taking

the samples they should be taken under the same conditions as to those anticipated during the

routine comparable means to avoid errors while using the systems (Vacca, 2010).

After the required information has being enrolled into the system, the data is taken to the

template where the machine uses a restrictive algorithm to deduce relevant feature to that of

biometric from the enrollee's representations. This model is used only in distinguishing features
Biometric 4

that have minutiae points. The model usually seizes a small outlay of memory in the computer.

As a result, it is easier to process the information. The last element of biometric involves the

issues of matching which includes the issues of balancing of two templates. In which the model

generated at the time of the enrollment stage is matched with the one generated on the spot as a

user attempts to gain admittance by rendering a biometric via a sensor (Vacca, 2010).

Usually the biometric are well protected to prevent personality fraud and to defend the

user on the matters of his privacy. It is critical to recognize the constitutional, moral and the

social concerns that are correlated with the biometric technologies and its relevant compilation,

use, and storage of biometric information. Besides, the system should adapt a system of

transparency with an improved trust and honesty skirmish while allotting with the people about

the biometric technologies and its applications (Maltoni, 2015). Concerning the issue of privacy,

it is a fundamental right to an individual since in this modern era it is considered as one of the

essential human rights. Furthermore, privacy is critical to a person since it secures the

preciseness of an individual and his association with the person's ability to constrain how to

locate his information (Maltoni, 2015). These privacy issues can be eased by developing primary

administration systems that can be able to monitor the admittance and use of a given biometric

database where the biometric temperate are stored. The templates are stored in either biometric

devices, a central computer which is operated remotely, a plastic card, a radio frequency

identification device, optical memory cards or smart cards. Further to maintain the authenticity

of the data stored in the biometric systems, the biometric data is usually more secure when the

information is stored under the control of an authorized user. From the measures, it is crucial to

establish a hierarchical admittance to the database whereby the administrator can only obtain

levels of biometric and personal data that is matching to their status. Besides the employees who
Biometric 5

are using the system are supposed to be trained appropriately on the usage of the information. In

some cases, some people fears that their persona, information could be obtained and ill-treated

by shady third parties, as a result for this system to be successful the users should be given

awareness on how the biometric system operates and the robust protection mechanism that is

there in place to guard the seized biometric data (Maltoni, 2015).

Concerning the ethical issues that are related to the usage of biometric systems, the

organization intending to use this identification control system are required to be transparent and

handle the development and administration of the scheme in agreement with the regulations and

line with the respect of the individual's fundamental ethical principles and civil liberties

(Farndon, 2012).

The privacy and security of a person can be enhanced through the use of the biometric

technologies given its accuracy is high as outlined in the paper. Thus in this digital era, people

are advised to embrace the usage of the biometric system to act as an answer to problems

concerning the network security and authentication. This system offers a long course spoof for

regulating access to high-security parts and further to prevent theft in a business setting.
Biometric 6

References

Blaul, S., & Chirillo, J. (2013). Implementing biometric security (1st ed.). Indianapolis, Ind.:
Wiley.

Farndon, J., & Lockie, M. (2012). Biometric technology (1st ed.). Oxford: Heinemann Library.

Maltoni, D., & K. Jain, A. (2015). Biometric Authentication (1st ed.). Berlin: Springer.

Vacca, J. (2010). Biometric technologies and verification systems (1st ed.). Amsterdam:
Butterworth-Heinemann/Elsevier.

You might also like