Professional Documents
Culture Documents
Term Paper For Info Security
Term Paper For Info Security
Information Security
Jalandhar, India
ishanmorani2017@gmail.com
Abstract—This paper describes one of the for this manufacturing as we change through the
essential elements for an overview of the main topics new time.
related to biometric security. Biometric
authentication compares data for the person's Biometric security is mainly implemented in
characteristics to that person's biometric "template" environments with critical physical security
to determine resemblance. requirements or that are highly prone to identity
theft. Biometric security-based systems or engines
The reference model is first stored. store human body characteristics that do not change
The data stored is then compared to the over an individual's lifetime.
person's biometric data to be authenticated. These include fingerprints, eye texture, voice,
Nature has completed human presences with unlike hand patterns and facial recognition.
appearances which may alter from one person to
another. This property is made up use of by An individual's body characteristics are pre- stored
Biometric technology to identify each person. in a biometric security system or scanner, which
Biometrics talk about to the unconscious documents may be accessed by authorized personnel. When an
of a person built on his/her physiological or individual walks into a facility or tries to gain
interactive characteristics. access to a system, the biometric scanner evaluates
his/her physical characteristics, which are matched
with stored records. If a match is located, the
individual is granted access.
I.I NTRODUCTION
1. Fingerprint identification
1. voice recognition,
2. Face recognition
2. signature dynamics (speed of
movement of pen, accelerations, 3. Iris recognition
pressure exerted, inclination), 4. Hand geometry
3. keystroke dynamics, 5. Signature recognition
4. the way we use objects, 6. Retinal scanning
5. gait, the sound of steps, 7. Voice verification
6. gestures, etc.
let’s see some of these biometric strategies, their has only been commercially available since
services, compensations and difficulties in detail. the 1990’s. Face recognition has established a
1. Fingerprint surge of courtesy since of tragedy of 11/9 for its
ability to identify known extremists and criminals.
1. Iris recognition:
REFERENCES