Biometrics

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

A.

FILL EACH BLANK SPACE WITH A CORRECT ANSWER

1. Biometrics is a technology used to identify an individual's physical


and behavioral characteristics.
2. Biometric template is a digital reference of the distinct
characteristics that are extracted from a biometric sample.
3. Behavioral biometrics pertains to the behavior exhibited by people
or the manner in which people perform tasks such as walking,
signing, and typing on the keyboard.
4. To acquire an adequate amount of data, the biometric sample
should be small enough to fit on a tablet and big enough to be able to
deal with.
5. Data integrity is the condition of being complete and unaltered
that refers to its consistency, accuracy, and correctness.
6. Physiological biometrics are based on the direct measurement of
parts of the human body such as iris, fingerprint, shape, and position
of fingers.
7. Minutiae matching algorithms compare the basic fingerprint
patterns (arch, whorl, and loop) between a stored template and a
candidate fingerprint.
8. Being one of the oldest and most popular recognition techniques,
fingerprint recognition is the most known and used biometrics
solution to authenticate people on biometric systems.
9. Voice recognition is nothing but speaker recognition.
10. Face recognition is the process of analysing the overall face
image as a weighted combination of a number of faces.

B. ANSWER THE FOLLOWING QUESTIONS


1. Biometrics refers to the use of unique physical or behavioural
characteristics to identify or authenticate individuals. These
characteristics are used by biometric systems to establish the identity
of a person. The uniqueness of a person lies in the fact that each
individual possesses distinct physiological and/or behavioural traits
that set them apart from others.

Physiological biometrics include physical attributes such as


fingerprints, iris patterns, facial features, hand geometry, DNA, and
palm prints. These characteristics are inherent to an individual's body
and are difficult to reproduce or fake.

Behavioural biometrics, on the other hand, focus on patterns or habits


exhibited by an individual. Examples include signature dynamics,
keystroke dynamics, gait analysis, voice patterns, and typing rhythm.
These behavioural traits are unique to each person and can be used for
identification or authentication purposes.

2.The process that tries to find out the answer to the question, "Are
you the same who you are claiming to be?" or "Do I know you?" is
called authentication. Authentication is a process used to verify the
identity of an individual or entity. It involves confirming that the
person or entity claiming a particular identity is indeed who they say
they are.

3. FRR stands for False Rejection Rate.


In a biometric system, the False Rejection Rate (FRR) refers to the
rate at which the system incorrectly rejects genuine attempts of
authentication or identification. It represents the percentage of valid
users who are incorrectly denied access or not recognized by the
system.
A biometric system with a low FRR ensures a high level of accuracy
and reliability in recognizing and accepting legitimate users, reducing
the instances of false rejection and enhancing the overall user
experience.

4. Shortcomings of conventional security aids:


1. Passwords can be easily forgotten or stolen: Conventional
security aids often rely on passwords for authentication.
However, passwords can be easily forgotten, leading to locked
accounts and the need for password recovery processes.
Additionally, passwords can be stolen or hacked, compromising
the security of the system.

2. Smart cards or access cards can be lost or stolen: Physical


access cards or smart cards used for security can be misplaced,
lost, or stolen. If an unauthorized person gains access to the
card, they can potentially use it to gain entry to restricted areas
or systems.

3. PIN codes can be easily guessed or shared: PIN codes,


similar to passwords, can be vulnerable to being guessed or
shared among individuals. Weak or easily guessable PINs can
be exploited by malicious actors, compromising the security of
the system.

4. Inconvenience and delays: Conventional security aids often


require additional steps or processes for authentication, leading
to inconvenience and potential delays in accessing systems or
facilities. This can be particularly problematic in high-security
environments where quick and efficient access is crucial.

Reasons for the requirement of biometrics:

1. Enhanced security: Biometrics provide a higher level of


security compared to conventional security aids. Biometric
traits, such as fingerprints or iris patterns, are unique to
individuals and difficult to forge or replicate. This reduces the
chances of unauthorized access or identity fraud.
2. Improved convenience: Biometrics offer convenience and
ease of use for users. Instead of remembering passwords or
carrying access cards, individuals can authenticate themselves
simply by using their biometric traits. This eliminates the need
for memorization or physical tokens, making the authentication
process quicker and more user-friendly.

3. Non-transferability and non-repudiation: Biometric traits


are inherently tied to an individual and cannot be easily shared,
transferred, or repudiated. Unlike passwords or access cards that
can be shared or used by others, biometrics ensure that the
authentication is specific to the rightful owner, enhancing
accountability and preventing unauthorized use.

5. The recognition system commonly used in document verification


and authorization is Optical Character Recognition (OCR). OCR
technology is employed to extract text and data from scanned or
photographed documents, such as passports, driver's licenses, identity
cards, and other forms of identification.

6. Behavioural biometrics refers to the field of biometrics that


focuses on the analysis and measurement of an individual's
behavioural patterns or characteristics for identification or
authentication purposes. These behavioural patterns are unique to
each individual and can be used as a means of recognizing and
verifying their identity.

Four main recognition systems used in behavioural biometrics are:

1. Keystroke Dynamics: This recognition system analyses the


unique typing rhythm and keystroke patterns of an individual. It
takes into account factors such as key press duration, time
intervals between keystrokes, and typing speed to create a
behavioural profile for identification.

2. Signature Dynamics: Signature dynamics recognition


system analyses the unique characteristics of an individual's
signature. It considers factors such as pressure, speed, stroke
order, and shape of the signature to create a behavioural profile
for authentication.

3. Voice Recognition: Voice recognition utilizes the unique


vocal characteristics and patterns of an individual's voice for
identification. It analyses factors such as pitch, tone, cadence,
and speech patterns to create a behavioural profile and verify the
user's identity.

4. Gait Analysis: Gait analysis focuses on the unique way an


individual walk or moves. It examines factors such as stride
length, walking speed, arm swing, and body posture to create a
behavioural profile for identification or authentication.

7. Three intrinsic failures that can occur in a biometric system are:

1. False Acceptance: False acceptance, also known as a false


positive, happens when the biometric system incorrectly
identifies an unauthorized individual as an authorized user. This
failure can occur due to various reasons, such as system errors,
low-quality biometric samples, or insufficient matching
thresholds. False acceptance can lead to security breaches and
unauthorized access to protected systems or resources.

2. False Rejection: False rejection, also known as a false


negative, occurs when the biometric system fails to recognize an
authorized user and rejects their authentication attempt. This
failure can occur due to factors such as variations in biometric
traits due to environmental conditions, changes in the user's
physical characteristics (e.g., weight gain/loss, aging), or poor-
quality biometric samples. False rejection can cause
inconvenience and frustration for legitimate users, leading to
delays in accessing systems or resources.

3. Non-Universality: Non-universality refers to situations


where certain individuals or groups may have difficulty
providing suitable biometric samples for recognition. For
example, individuals with medical conditions or disabilities may
have unique physical characteristics that make it challenging for
the biometric system to accurately capture or match their
biometric traits. Non-universality can result in exclusion or
limited accessibility for certain individuals, reducing the
effectiveness and inclusivity of the biometric system.

8. List the Merits and Demerits of Finger Recognition System and of


Facial Recognition System.
List of Finger Recognition Facial Recognition
System System
Merits 1. High Accuracy 1. Non-contact and
2. Non-intrusive Non-intrusive
3. Stability 2. Wide Range of
Applications
3. Real-time
Processing

Demerits 1. Latent Print 1. Environmental


Recognition Factors
2. Contact Sensitivity 2. Privacy Concerns.
3. Vulnerability to 3. Bias and
Spoofing Discrimination
9.Comaprison

Physiological Behavioural Combination of Both


Modality Modality: Modalities:

- Fingerprint - Gait (the way one - Hand Geometry


Recognition walks) Recognition System
- Iris Recognition - Rhythm of typing - Facial Recognition
System keys System
- Retinal Scanning - Signature
System - Voice Recognition
- DNA Recognition
System

10.Comparison
Speaker Recognition (Voice Speech Recognition
Recognition)
Recognize WHO is speaking Understand and comprehend
WHAT was spoken
| Identify a person by analysing Hand-free computing, map or
tone, voice pitch, and accent menu navigation
C-FILL THE BLANK(DASHED) SPACES AND NAME EACH
OF THE FOLLOWING
1.

Fig: Basic Components of Biometric System

2-FILL THE FOLLOWING FIGURE

Figure1: Voice Recognition System


Figure2 :Iris Recognition System

You might also like