Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Biometric Security

Overview

Biometric security is directly linked to authentication of data and it basically relies on


certain characteristics of human beings to verify that data comes from a secure and
trusted source. This type of authentication is used to protect data and strengthen
internet security.

Fingerprint scans

Fingerprint scans require you to, firstly, put your finger on a


scan and let the machine take an image of your fingerprint.
After we have the original fingerprint in the database, the
computer will make a link between the fingerprint and its
owner (the owner of the fingerprint must input their
information in the machine before taking the scan). Now that
the fingerprint is stored in the database, any person can now
put their finger on the scan and if it matches with one of the
fingerprints stored in the database of the machine, it will let
them in.

These types of scanners work by analysing in huge detail


the ‘ridges’ and ‘valleys’ that are unique to each fingerprint.
They grab the information from a fingerprint imputed by a
random user and compare it with previous fingerprints
stored in the database, and if it matches one of them, it will
let that person in.

Advantages Disadvantages

● Fingerprints are unique, making ● Machines are very expensive to


this method very safe as it is buy and set up.
challenging to replicate a person’s ● When a person gets injured, their
fingerprints. fingerprints may be altered slightly
● It would be impossible to sign in or which may prevent the scanner
log in for somebody else, which from recognising the fingerprint.
prevents identity fraud. ● In the case of a power outage, it
FIngerprints cannot be shared would be dangerous if the
● Fingerprints are always on your fingerprint scanner stopped
hands which means you don’t have working and trapped people inside
to remember to carry a key. a building in an emergency.

Facial recognition

Facial recognition works in somewhat a similar way to


fingerprint recognition, with the slight change of using your
face instead of using your finger to identify yourself. First,
you need to register the details on your face in order for the
computer to get that information and link it with a
person/user which would be you. They manage to record
the information using software that calculates the positions
of certain features (jawline, eyes, nose, mouth, cheeks) on
your face.

And that’s it. Whenever you want to access your device or


enter a building, you just need to focus your face on the
camera and let the computer do all the work. It works in a very similar way to fingerprint
recognition, in that it grabs the image of a person’s face and compares it with other
faces stored in the database and if it matches, it will let that person in.

Advantages Disadvantages

● Relatively inexpensive technology. ● You could be subject to identity


● It is quick and easy to use. Does fraud because a person can print
not require the user to carry a key, an image of your face and may
ID, or remember a password. trick the recognition device.
● It can be somewhat inaccurate due
to changes in lighting, the person’s
age, or their hair colour.
● These technologies could be
discriminating towards people of
colour as the machine often does
not record their facial features very
well.
Voice Recognition

For voice recognition to work, we first need a


sound detector, such as a microphone, and
a device attached which will do the work of
registering the information, processing it,
and comparing it. Similarly to other
authentication methods, the device will let
you register your voice into the database.
The computer does this by converting
analogue audio, such as your voice, into
digital audio, which consists of 1’s and 0’s.
Systems which require words will also need
to have implemented vocabulary words.

This kind of authentication method is mostly used on mobile phones and home
speakers, because it would be inconvenient to use it in a public space where silence is
mandatory such as in a library. Whenever you want to access the system, you have to
say a certain phrase and if the information matches with the one on the database, the
system will welcome you.

Advantages Disadvantages

● It usually takes a very short time ● Words can be misheard by the


for verification machine because they are too
● The technology is inexpensive similar (such as ‘hear’ and ‘here’)
● Allows users to multitask because ● Background noise can interfere
they can speak to their Google and the machine may not work in
Home or Amazon Alexa while those circumstances.
doing something else, such as a ● A person’s voice can be recorded
house chore. and used for malicious purposes,
tricking the machine, and leading
to identity fraud.
● An illness such as a cold or a sore
throat can change a person’s
voice, making authentication very
difficult and inaccurate.

You might also like