Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

INTRODUCTION

BACKGROUND OF THE STUDY

With the quickly developing society people are, a lot can change in a year

Technology, lifestyle and even people's means of communication, and with those who

strive for the good of humanity, there are those with a far more malicious intent.

Incidents such as hacking, phishing and or just plain invasion of privacy has been going

on for years, creating new ways to violate and gather any protected information or area.

Because of this the classic means of security may not be as secure as it was in the

past. Thus, people created a different way of securing vital information or just a means of

verifying oneself.

Biometrics is the technical term the refers to the measurement and calculation of

one's body while Biometric Authentication in computer science as a form of

identification and access control. Biometrics consist of the word’s "bio" meaning "life"

and "metrics" which is "to measure", where biometrics as a whole directly translates to

"To measure life".

Biometric Access control has gained acceptance over the years due to limited

success of physical checks in safeguarding vital assets in a world that grows more

dangerous by the day. This method has been used by governmental and private agencies

to secure their assets against theft and misuse by miscreants. Conditional access through

biometric security has become all the more important after the increasing incidences of

terrorist activities in the modern world. One such reliable system is the Fingerprint
Access Control, which uses Biometric fingerprints to provide conditional access to

individuals.

Biometrics systems only became apparent to people over the last few decades

however the main concept or idea of this dates back hundreds or even thousands of years

ago. One of the oldest and basic example characteristics used for recognition is by human

face. People have been using faces to identify both known and unfamiliar faces.

Other characteristics have also been used throughout the history of civilization as

a more formal means of recognition, such as handsprints left by cavemen which acted as

signatures, how in 500 B.C. fingerprints where used in Babylonian transactions recorded

in clay tablets and many more. And from those people continue to evolve, thinking of

different ways to recognize and authorize the right people until the late 1800s were a

method was developed to index fingerprints that provided the ability to retrieve record.

And it was then when true biometric systems began to emerge, 1990s had an explosion of

activity and began to surface in everyday applications in early 200s.

Thus, circles back to the present were people's everyday phones, gadgets and what

not have this feature the said phone only permits the authorized user to access it.

Different versions of phones provide different types of security ranging both from its

efficiency and variety. Were some phones will provide with fingerprint activated locks

only, some gives user face recognition and even voice recognition authorization pass.

Passwords and pins can be easily stolen and recovered if ever a locked phone got stolen

but if it was locked via fingerprint and/or and of the other security features that was

mentioned, gaining access to the phone will prove to be more difficult than the latter.
Biometric Security Systems ranges from people's physiological traits to voice

response systems. Fingerprint Recognition is one of the most recognizable examples of

this, where a finger be place on the scanner to authenticate if it’s the owner. Face

recognition, as the name suggests, uses the camera function to authenticate and check the

users face in order to get access. Voice is the only available biometric identifier that can

be used over the telephone. Customers will become impatient if a number of security

questions is asked before authentication. One of the largest banks in India uses this Voice

Recognition Systems which judges their speech patterns to allow them perform

transactions through the phone.

But one of the key reasons as why the researchers’ chose to pursue the study is

how effective or efficient it truly is in the realm of students in AMA Computer College

Cabanatuan, the respondents are most likely to be aware or maybe even knowledgeable

about Biometrics and its whole ordeal, thus make great potential source of data. Though

no matter how much people praise this type of security, like everything, it’s not perfect

by all means. And that's where the researchers' motivation stems from, to see the limits of

Biometrics, to see what it's advantages and disadvantage of it and thus find ways to

improve upon those flaws and give students better sense of privacy and security.
Significance of the Study

The information result of the study will provide and act as a guide to those who

will find it beneficial such as the following:

Parents or Adults in general can also find a great deal of benefits from this

study. Like the previous one, being in a different and unsecure environment is really risky

especially in this generation, because of that having a system of security only accessible

by the actual owners will provide enough time for authorities to locate and secure the

target if ever the device got stolen.

Students will find great use of this considering phones and these devices will

give great aid during classes both as a form of information gatherer and as

communication. Some students attend school farther than their old one, or even

rent/board a room much closer to the school, thus being in a different environment people

must take extra precaution for the safety and privacy.

Future Cyber Police Officers can benefit from this study. Due to the rise of

crime and thievery, being able to understand the premise of Biometric Security can

provide a huge step forward for those who are interested in taking this career choice.

Future Researchers will definitely find great benefit from this study if ever some

are conducting one similar to this.


Statement of the Problem

The research paper's goal is to expand and understand the limits and specialties of

the biometric functions installed in AMA Students' everyday devices, specifically aiming

to answer the following:

1. Do the Students of AMA Computer Cabanatuan aware/use Biometric Security

Systems?

2. What are the advantages and disadvantages of the Biometric Security System?

3. How dependable are Biometric Systems in security?

4. What form of security do students prefer?

5. What is the most used Biometric Security System by AMA Students?


Scope and Delimitation

This study seeks to identify to what extent biometrics can be secured, and how

well people can steal other’s identity. This study was carried out at the AMA Computer

College Cabanatuan Campus during the year 2019-2020. The researchers limited the

study to staff and students, who use biometrics security. The primary data gathering

method used was interview to determine the user’s perspective base on their experiences

and through their interaction with biometrics and the secondary was done through using

questionnaire.
REVIEW OF RELATED LITERATURE

This chapter presents the different related literature; both local and foreign, which

supports the researchers on this study. It is also a review of the existing literature relevant

to the topic biometrics security.

Foreign Literature

According to an article made by Danny Thakkar at Bayometric.com, Biometric

Access control has been getting a lot more attention due to unsatisfactory results or

physical checks in safeguarding vital assets in the world and continue to be riskier as it

progresses. Thus, this method has been used by governmental and private agencies to

secure their assets against theft and misuse by miscreants has become all the more

important after the increasing incidences of terrorist activities in the modern world. One

such reliable system is the Fingerprint Access Control, which uses Biometric fingerprints

to provide conditional access to individuals.

The article continues to explain what Biometric Security is in a more in dept

manner saying "Biometric Access Control is a security system that provides conditional

access after scanning for unique physical characteristics. A reader scans the face, fingers,

irises and veins for unique traits, converts the data into digital format (template) and then

uses a complex algorithm to make a match". Even remarking how experts praise it for

being foolproof and the possibility of it being misused are little to none. Biometric

Access is said to also improve attendance in not only in a school environment but also

governmental organizations plagued by rampant instances if absenteeism.


A writer by the alias of "Editor" published an article on Techadvisory.org around

August 2019 going on about how Biometrics enhances security. “Constantly using

passwords on a smartphone can be a pain, not to mention a high security risk. Luckily,

popular mobile browsers like Chrome and Firefox Lite are now supporting biometrics for

authentication to make logging in to social media, email, and online shopping accounts

easier and more secure. Here’s what you need to know about the Web Authentication

API". Then continue to cite different instances where Biometric Features that many

mobile users are not even aware of such as how Chrome, Windows, Mac, Linus and

Android are adding features where users can safely login via Sub, Bluetooth and NFC

devices connected through tables where users can verify accounts on the go.

The article continues to explain how Browser-based Biometrics help prevent

cyberattacks by relying on facial scans, fingerprints and voice recognition. It’s says it can

provide users with more secure online transactions, Browser-based biometrics is starting

to revolutionize and streamline the steps in verifying online accounts. It promises to add

more security and ease in logging in and transacting on the internet. And in the end the

article remarks on how it is highly recommended to update browser-related innovations

for a more secure surfing and browsing experience.


Local Literature

Christ Burt from BiometricsUpdate.com published an article on Jul 3, 2019 titled

" Philippines plans biometric enrollment of 105 million people as Manila pilot’s facial

recognition ". Thus, showing how reliable this system is. The article states how The

Philippines is planning to register over a hundred million people in its biometric National

ID system where the pilot's aim it to produce Biometric ID cards.

When public facial recognition was launched in Manila a pilot of cloud and

artificial intelligence-based video surveillance with facial recognition capabilities from

Iveda has been successfully completed in Metro Manila, according to a company

announcement. Multiple renowned services collaborated with each other to produce more

Biometric, specifically face recognizing appliances, to meet the requirements. A lot of

finance and resources went into this project and as well as time. In the end it shows how

much this investment will be worth it for the advancement of the country using the

Biometrics Systems.

An Article anonymously published on findbiomtrics.com on July 23,2015 titled

"Philippine Police Get Fingerprint Identification System" saying how Philippine National

Police or PNP in Manila got a new weapon in their arsenal. Said weapon is the

"Automated Fingerprint Identification System" or AFIS that comes from NEC


Corporation company that is known as a Market Leader in biometrics for law

enforcement.

AFIS revolves around the collection and matching of fingerprint biometric data. It

enables police forces to match fingerprints to individuals in criminal databases, both

locally and beyond the country’s borders, similar to the FBI’s Next Generation

Identification system in America.

This article reinforces the idea how Philippines are keeping up with the most

reliable way of pursuing goals, biometrics can be used as a shield for protection at

unwanted attackers and how it can be used as a weapon to find or figure out who the

culprit is.

You might also like