pt2 Biometrics MMJ

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

BIOMETRICS

Nueva EcijaHIgh School

Biometrics, automatic methods for identifying a person on the basis

of some
characteristics,
patterns, are
more capable in
technique based
comes from the

biological or behavioral characteristic of the person. Many biological


such as fingerprints, and behavioral characteristics, such as voice
distinctive to each person. Therefore, biometrics is more reliable and
distinguishing between a specific individual and an impostor than any
on identification (ID) document or a password. The word biometrics
Greek bios (life) and metrics (measure).

In computer technology, biometrics relates to identity-confirmation and security techniques that rely on measurable,
individual biological characteristics. For example, fingerprints, handprints, or voice patterns might be used to enable
access to a computer, to a room, or to an electronic commerce account.
In general, there are three levels of computer security schemes.

I. Level 1 relies on something a person carries, such as an ID badge with a photograph or a computer cardkey.

II. Level 2 relies on something a person knows, such as a password or a code number.

III. Level 3, the highest level, relies on something that is a part of a persons biological makeup or behavior, such as a
fingerprint, a facial image, or a signature.

Biometrics Technique

Facial Recognition
Fingerprint Identification
Hand Geometry
Retinal Pattern Recognition
Iris Based Identification
Signature Recognition
Voice Recognition

Maxine M. Jimenez
7-SANTAN (ICT)

You might also like