Professional Documents
Culture Documents
Nidhi Saini K.I.E.T. Chakshu Agarwal A.K.G.E.C. Kanika Malik A.K.G.E.C
Nidhi Saini K.I.E.T. Chakshu Agarwal A.K.G.E.C. Kanika Malik A.K.G.E.C
K.I.E.T.
CHAKSHU AGARWAL
A.K.G.E.C.
KANIKA MALIK
A.K.G.E.C.
INTRODUCTION
The terms "Biometrics" and "Biometry" have been used since early in the 20th
century to refer to the field of development of statistical and mathematical
methods applicable to data analysis problems in the biological sciences.
In today's world , where many important activities are carried out with the help
of computer, the need for reliable, simple, flexible and secure system is a great
concern and a challenging issue for the organization .
Biometric-based authentication system measures and analyses a person’s
unique characteristics and uses it for authentication. The particular
characteristic which is used for authentication is called biometric trait. Biometric
techniques rely on unique characteristics of individuals, such as fingerprints,
iris, signature etc.
It is not anew concept :the ancient biometric technique which was practiced
was a form of finger printing being used in China in the 14th century, as
reported by the Portuguese historian Joao de Barros.
Biometric authentication is increasingly being used in areas like banking,
retailing, defense, manufacturing, health industry, stock exchange, public sector,
airport security, internet security etc.
CLASSIFICATION OF BIOMETRIC TECHNIQUES
BEHAVIORAL BIOMETRICS:
These biometric techniques are related to the behavior of a person.
Some researchers have coined the term behavior-metrics for this class
of biometrics.
IRIS RECOGNITION
Advantage:
Since fingerprints are the composition of protruding sweat glands, everyone has unique
fingerprints. They do not change naturally.
Its reliability and stability is higher compared to the iris, voice, and face recognition
method.
Disadvantage:
Fingerprints are vulnerable to distortion brought on by dirt and twists.
Some people may feel offended about placing their fingers on the same place where many
other people have continuously touched.
KEYSTROKE
DISADVANTAGES
The weaknesses of a keystroke recognition system are the same as those suffered by other
systems that rely on a user name/password combination. For example, passwords can be
forgotten or compromised while users will have to remember multiple passwords in order
to gain access to, for example, a corporate network.