Running head: Biometric 1
Biometric
Students Name
University Affiliation
Biometric 2
A biometric is an identity and verification mechanism that is measurable, robust and
distinctive in order to get the physical characteristic of an individual. This technology is mainly
applied in the identification process and access control of people where surveillance is used.
Biometric is based on an authentication where an individual may be recognized by his/her
natural corporeal attributes. Biometric identifiers can be grouped as either physiological
characteristics or behavioral characteristics. Physiological features that are used in biometric
authentication involves the issues of fingerprints, DNA, face or ear features (Blaul, 2013). For
the case of behavioral characteristics, they require the pattern of an individual for instance typing
rhythm, gait, gestures, and voice. These physical traits can be measured by sensors and changed
into a quantifiable digital form, As a result, allowing it to be easily automated. This mechanism
of biometric is considered to be robust since it can measure the characteristic of an individual
considering the changes that take place with respect to time. This paper will focus on the various
types of biometric systems, different implementations used in the biometric system and the moral
used in biometric systems plus the privacy matters related to the biometric systems (Blaul, 2013).
This system is considered as an easier technology to use in authentication situation since
it offers an improvised reliability and has a strengthened data delivery capacity. It has has a high
level of accuracy with almost 100% accuracy when matching the biometric data against an
extensive database that is available in the system .Biometric is considered as one of the secure
systems since it is based on traits that are freakish and permanents and challenging to replicate
owing to the approaches in the technology data transmission security and biometric wrenching
tools. There are various types of biometrics system. Firstly it involves the technology of DNA
matching which is a chemical biometric system where it identifies an individual trait using the
analysis of segments of the DNA. Secondly the Visual biometric is used to identify a person by
Biometric 3
verification from the shape of the ear. Face recognition is another visual biometric where it
analysis the facial characteristics pattern of a person for the authentication. Most face recognition
systems usually use Eigen faces features to reports the identity of an individual. Another
biometric system involves the signature recognition whereby the authentication of a person is
identified by the review his/her manuscript style, in particular, the name. In this system, there are
two fundamental models of digitally transcribed signature authentication which entail the static
and dynamic. Lastly auditory biometric it involves the identification the speaker identity of an
individual. Whereby the system matches the different voice views in the database with a
particular voice of a person to identify him/her (Blaul, 2013).
During the implementation of a biometric, there are three elements that system has to
contain to be fully operational. Firstly the system should consist the enrollment process.
Secondly, the system should include the templates. Lastly, it should have a matching process
which is used to compare a live biometric representation corresponding to one or many models
in the memory. Focusing on the enrollment, it is considered as one of the critical first stages of
the process of authentication since at this stage it is where the templates that will be used for the
subsequent steps are based on. Typically the system usually takes at least three representations of
the identical biometric and equates them to generate an enrollment template. This stage is very
sensitive in that it responds to the environmental changes as a result during the process of taking
the samples they should be taken under the same conditions as to those anticipated during the
routine comparable means to avoid errors while using the systems (Vacca, 2010).
After the required information has being enrolled into the system, the data is taken to the
template where the machine uses a restrictive algorithm to deduce relevant feature to that of
biometric from the enrollee's representations. This model is used only in distinguishing features
Biometric 4
that have minutiae points. The model usually seizes a small outlay of memory in the computer.
As a result, it is easier to process the information. The last element of biometric involves the
issues of matching which includes the issues of balancing of two templates. In which the model
generated at the time of the enrollment stage is matched with the one generated on the spot as a
user attempts to gain admittance by rendering a biometric via a sensor (Vacca, 2010).
Usually the biometric are well protected to prevent personality fraud and to defend the
user on the matters of his privacy. It is critical to recognize the constitutional, moral and the
social concerns that are correlated with the biometric technologies and its relevant compilation,
use, and storage of biometric information. Besides, the system should adapt a system of
transparency with an improved trust and honesty skirmish while allotting with the people about
the biometric technologies and its applications (Maltoni, 2015). Concerning the issue of privacy,
it is a fundamental right to an individual since in this modern era it is considered as one of the
essential human rights. Furthermore, privacy is critical to a person since it secures the
preciseness of an individual and his association with the person's ability to constrain how to
locate his information (Maltoni, 2015). These privacy issues can be eased by developing primary
administration systems that can be able to monitor the admittance and use of a given biometric
database where the biometric temperate are stored. The templates are stored in either biometric
devices, a central computer which is operated remotely, a plastic card, a radio frequency
identification device, optical memory cards or smart cards. Further to maintain the authenticity
of the data stored in the biometric systems, the biometric data is usually more secure when the
information is stored under the control of an authorized user. From the measures, it is crucial to
establish a hierarchical admittance to the database whereby the administrator can only obtain
levels of biometric and personal data that is matching to their status. Besides the employees who
Biometric 5
are using the system are supposed to be trained appropriately on the usage of the information. In
some cases, some people fears that their persona, information could be obtained and ill-treated
by shady third parties, as a result for this system to be successful the users should be given
awareness on how the biometric system operates and the robust protection mechanism that is
there in place to guard the seized biometric data (Maltoni, 2015).
Concerning the ethical issues that are related to the usage of biometric systems, the
organization intending to use this identification control system are required to be transparent and
handle the development and administration of the scheme in agreement with the regulations and
line with the respect of the individual's fundamental ethical principles and civil liberties
(Farndon, 2012).
The privacy and security of a person can be enhanced through the use of the biometric
technologies given its accuracy is high as outlined in the paper. Thus in this digital era, people
are advised to embrace the usage of the biometric system to act as an answer to problems
concerning the network security and authentication. This system offers a long course spoof for
regulating access to high-security parts and further to prevent theft in a business setting.
Biometric 6
References
Blaul, S., & Chirillo, J. (2013). Implementing biometric security (1st ed.). Indianapolis, Ind.:
Wiley.
Farndon, J., & Lockie, M. (2012). Biometric technology (1st ed.). Oxford: Heinemann Library.
Maltoni, D., & K. Jain, A. (2015). Biometric Authentication (1st ed.). Berlin: Springer.
Vacca, J. (2010). Biometric technologies and verification systems (1st ed.). Amsterdam:
Butterworth-Heinemann/Elsevier.