Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Biometric Security

MORANI ISHAAN MAHMAD

Information Security

Jalandhar, India

ishanmorani2017@gmail.com

Abstract—This paper describes one of the for this manufacturing as we change through the
essential elements for an overview of the main topics new time.
related to biometric security. Biometric
authentication compares data for the person's Biometric security is mainly implemented in
characteristics to that person's biometric "template" environments with critical physical security
to determine resemblance. requirements or that are highly prone to identity
theft. Biometric security-based systems or engines
 The reference model is first stored. store human body characteristics that do not change
 The data stored is then compared to the over an individual's lifetime.
person's biometric data to be authenticated. These include fingerprints, eye texture, voice,
Nature has completed human presences with unlike hand patterns and facial recognition.
appearances which may alter from one person to
another. This property is made up use of by An individual's body characteristics are pre- stored
Biometric technology to identify each person. in a biometric security system or scanner, which
Biometrics talk about to the unconscious documents may be accessed by authorized personnel. When an
of a person built on his/her physiological or individual walks into a facility or tries to gain
interactive characteristics. access to a system, the biometric scanner evaluates
his/her physical characteristics, which are matched
with stored records. If a match is located, the
individual is granted access.
I.I NTRODUCTION

Biometric security is a security mechanism used to


authenticate and provide access to a facility or
system based on the automatic and instant
verification of an individual's physical II. NEED FOR Biometric
characteristics. Because biometric security evaluates
In order to duck the problems of fail to recollection
an individual’s bodily elements or biological data, it
is the strongest and most fool proof physical security the keywords and ID codes, Biometrics based
verification helps us in verifying your finger prints,
technique used for identity verification. The first
modern biometric device was introduced on a iris design and voice for your uniqueness at
ATM’s, Airports etc.., you can solve your
marketable basis over 25 years ago. In the later
years, hundreds of these hand geometry devices were families, withdrawing money on or after a bank
with just a flash of an eye, a tap of your finger
connected at high security facilities functioned by
Western Electric, Naval Intelligence, the Department or by disinterested presenting your expression.
of Energy, and the comparable. There are currently
over 20,000 workstation rooms, vaults, exploration
labs, day care centres, blood banks, cash machine III. Biometric identification
and military fixings to which access is measured
using strategies that scan an entity’s unique
Biometric identification consists of determining
physiological or behavioural features. Reduced the identity of a person.
values have led to amplified alertness of biometric  The aim is to capture an item of biometric
machineries; this coupled with. inferior overall data from this person. It can be a photo of
prices will certainly bode well their face, a record of
their voice, or an image of their
fingerprint.
 This data is then compared to the
biometric data of several other
persons kept in a database.
In this mode, the question is simple: "Who are
you?"

IV. Biometrics: trends

Faced with document fraud and identity theft,


terrorism and cybercrime, international regulation
changes, new biometric
security solutions are being implemented.

Of course, increased public acceptance, massive V Identity and biometrics


accuracy gains, a rich offer, and falling prices of
sensors, I.P. cameras, and software make installing
biometric systems easier. There are three possible ways of proving one's
identity:

1. Using something you have. This


 Biometric identifiers method is relatively easy to do,
whether by using the key to one's
vehicle, a document, a card, or a
There are two types of biometrics: badge.
1. Physiological measurements
2. Utilizing something you know, a name, a
secret, or a password.
They can be either morphological or biological. 3. Through what you are, your fingerprint,
your hand, your face.
1. Morphological identifiers mainly
consist of fingerprints, the hand's
shape, the finger, vein pattern, the eye The use of biometrics has many benefits.
(iris and retina), and the face's shape.
2. For biological analyses, DNA, blood, The leading one is the level of security and
saliva, or urine may be used by accuracy* that it guarantees. In contrast to
medical teams and police forensics. passwords, badges, or documents, biometric data
cannot be forgotten, exchanged, stolen, or forged.

Now let’s see approximately of the biometric


3. Behavioural measurements strategies being widely used in numerous areas like
computer/network safety, government societies,
prisons….

The most common are- They are like: -

1. Fingerprint identification
1. voice recognition,
2. Face recognition
2. signature dynamics (speed of
movement of pen, accelerations, 3. Iris recognition
pressure exerted, inclination), 4. Hand geometry
3. keystroke dynamics, 5. Signature recognition
4. the way we use objects, 6. Retinal scanning
5. gait, the sound of steps, 7. Voice verification
6. gestures, etc.
let’s see some of these biometric strategies, their has only been commercially available since
services, compensations and difficulties in detail. the 1990’s. Face recognition has established a
1. Fingerprint surge of courtesy since of tragedy of 11/9 for its
ability to identify known extremists and criminals.

1. Iris recognition:

Finger prints are exclusive to each discrete and


no two fingerprints are similar.
Fingerprint recognition is greatest lengthily
recognized biometric between the technology being
No two irises are comparable, not even in
used currently. Fingerprints comprise designs of
one exact or in equal clones. The iris covers
edges and valleys as well as niceties points.
over 400 illustrious
2. Face (or Facial) recognition: appearances. Therefore, iris scanning is greatly
more exact than impressions or even DNA
examination of the unique features. Iris
scanning is performed by scanning the
measures of the colored circle that surrounds
the pupil. Through audio-visual technology, a
camera examinations the iris design, which
contains of corona, pits, crypts,
filaments, striations, and radial troughs
(page). Iris perusing is easy, precise, and
suitable. One substantial downfall of Iris
appreciation is the initial start-up prices as
they are extremely high.

VI. 1.Advantages of Biometric


Authentication:

1. No remembering of passwords or login


ID's is required.

2. Better alternate of saving time and resources.

3. Only Legitimate user can get access to the


personal data or accounts.

4. Elimination of need of carrying authorized


documents
Face recognition is one of the original biometrics’
technologies. The technology analyses facial 2. Disadvantages of Biometric Verification
characteristics and attempts to match it to
database of digitized pictures. This technology is
comparatively new and
1. Some of these methods are limitation
1. Biometrics Resource Centre,
for physically challenged people.
2000, Biometric Standards and Current
2. Changing of amount of light entering Standard-Related Activities,
into eye due to pupil contraction may http://www.itl.nist.gov/div893/biometric
lead to system showing error. s/standards.html (February 21, 2007).

3. DNA analysis takes time, retina 2. Campbell, P, Calvert, B and Boswell,


scanning requires expensive device. S (2003) Security guides to network
security fundamentals: Cisco learning
institute.
3. https://www.engineersgarage.com/blogs
VII. Conclusion
/biometrics- technology-and-its-scope-
Biometrics can fulfil two distinct functions, future
authentication, and identification, as we said.
4. Garfinkel, S., 2000, Database Nation: The
Identification answers the question, "Who are you?". Death of Privacy in the 21st Century,
In this case, the person is identified as one, among
O’Rielly & Associates.
others (1: N matching). The person's personal data to
be identified are compared with other persons stored 5. IHS Inc., 2005, European Commission
in the same database or possibly other linked
IDs Biometrics Challenges, The
databases.
Authentication answers the question: "Are you complete report is titled Biometrics at
really who you say you are?". In this case, the Frontiers: Assessing the Impact on
biometrics allows the person's identity to be certified Society: Source —European Commission
by comparing the data they provide with pre- Directorate General Joint Research
recorded data for the person they claim to be (1:1 Centre (JRC),
matching). http://electronics.ihs.com/news/2005/eu
These two solutions call upon different
-biometrics-impact.htm (March 21,
techniques.
2007)
In general, identification requires a centralized
biometric database that allows several persons'
biometric data to be compared.
Authentication can do without such a centralized
database. The data can simply be stored on a
decentralized device, such as one of our smart cards.

For data protection, a process of authentication with


a decentralized device is to be preferred. Such an
approach involves less risk.

The token (I.D. card, military card, health card


) is kept in the user's possession, and their data does
not have to be stored in any database.
Conversely, if an identification process requiring an
external database is used, the user does not have
physical control over their data, with all the risks
involved.

REFERENCES

You might also like