StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Introduction to Biometric Identification Database - Essay Example

Cite this document
Summary
The term "biometrics" is derived from the Greek words "bio" (life) and "metrics" (to measure). Biometrics is an evolving field of science which deals with establishing the identity of a person based on his/ her biological, anatomical and physiological features like face, fingerprints, handwriting, voice, iris structure, retina, veins, DNA etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Introduction to Biometric Identification Database
Read Text Preview

Extract of sample "Introduction to Biometric Identification Database"

Download file to see previous pages

But the evolution of biometrics in the form of automated identification of finger prints, geometry of hand, iris construction, facial structure, genetic makeup etc. is a relatively new phenomenon. Portuguese explorer Joao de Barros also points out1 the existence of Biometrics in China in the 14th century. Barros narrates that Chinese merchants used to stamp their children's palm prints and footprints on a piece of paper with ink. This way the Chinese merchants used to distinguish the young children from one another.

This can be termed as the beginning of the modern biometrics. The recent advances in Information Technology and computing have provided newer dimension to this emerging field. During the last couple of decades biometrics has established itself as a comprehensive tool for establishing Identities and Verification. In 1890, Alphonse Bertillon, a Parisian police desk, studied body length to identify criminals. Subsequently the method came to be known as Bertillonage method, which relied heavily on measuring the body length.

But the method did not last long as there were many false alarms as a result of false identifications. Thereafter, finger printing became the reliable method of identifying the criminals. There are human rights groups and civil liberties advocates argue that increasing use of biometrics has resulted in trespassing into the privacy of all human beings, but the rise in terrorist activities in recent years has forced the defense and security experts to rely heavily on the biometrics for identifying the mischief makers.

Types of Biometrics and their usageA biometric system is designed to test one out of the two possible hypotheses (Wayman et al., 2005): (1) That the submitted samples are from an individual known to the system; or (2) That the submitted samples are from an individual not known to the system. Applications to test the first hypothesis are called "positive identification" systems (verifying a positive claim of enrollment), while applications testing the latter are "negative identification" systems (verifying a claim of no enrollment).

Biometrics, in general can be divided into two main groups, physiological and behaviorali. Physiological factors: These factors depend upon the physical structure and appearance of the individual.Iris Scan: The Iris of an individual is scanned to match it with the stored image. Quite often the iris scan may not come out with actual on if the person is putting on dark glasses, or is suffering from some eye disease.Fingerprint: This is one of the oldest tried and tested methods of biometrics. In fact the nail is also included for identification in fingerprinting.

Hand: This includes the structure of knuckles, palm and the vascular networking of hand.Face, Earlobe, Lips: The camera scans the facial structure or the fleshy pendulous part of the external ear or lips of the individual.Voice: The voice is also one of the most distinguishing features to identify an individual. Therefore the voice patterns form one of the most dependable biometric measures. Retina: like iris, the retinal structure too provides an insight into the nature and character of the person.

DNA: This method too is quite frequently used in a number of cases to establish the identity of the individual.Body Odor and Sweat Pores: There are biometric techniques which can sense the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Introduction to Biometric Identification Database Essay”, n.d.)
Introduction to Biometric Identification Database Essay. Retrieved from https://studentshare.org/miscellaneous/1521487-introduction-to-biometric-identification-database
(Introduction to Biometric Identification Database Essay)
Introduction to Biometric Identification Database Essay. https://studentshare.org/miscellaneous/1521487-introduction-to-biometric-identification-database.
“Introduction to Biometric Identification Database Essay”, n.d. https://studentshare.org/miscellaneous/1521487-introduction-to-biometric-identification-database.
  • Cited: 0 times

CHECK THESE SAMPLES OF Introduction to Biometric Identification Database

The Biometric Facial Recognition Process

The fourth stage involves the comparison of the already obtained templates with other pre-recorded faces on a database.... The process involves both identification and verification of these traits.... The identification process is different from the verification process in that verification involves comparison of the facial feature of a subject with the features of one other face to ascertain whether they match while identification involves comparison with several other faces to determine which of them accurately matches with the subject....
5 Pages (1250 words) Term Paper

Credit Card Fraud Statistics and Facts

"A credit card is a thin plastic card, usually 3-1/8 inches by 2-1/8 inches in size, that contains identification information such as a signature or picture, and authorizes the person named on it to charge purchases or services to his account -- charges for which he will be billed periodically.... Moreover, a personal identification number (PIN) is also provided by the financial institution which supplies the credit card to its customers.... The credit card provider takes note of either one of the biometric characteristics mentioned above for making and storing biometric template in the master computer at the time of issuing the card....
5 Pages (1250 words) Term Paper

Identity Cards

However, debate continues as to how well a smart identity card containing a biometric will address the problems of terrorism.... ut a more pressing concern over identity cards lies in the robustness of biometric recognition technology, given that this is central to the government's scheme.... biometric technology was once hailed as the ultimate authentication mechanism, appearing to be foolproof given that it is supposed to be based on a unique physical or biological characteristic of an individual....
9 Pages (2250 words) Assignment

Biometrics: Fingerprints, Retina, Facial Recognition, and Iris Patterns

A particular class of identification technologies has been referred by the high technology sector of the biometrics.... Technical ability of the humans in terms of cataloguing and tracking the biological traits is considered during the selection of individual traits in the contemporary biometric applications.... In this regard, a number of experts are endeavoring for the improvement of biometric technology for the advancement of security of life measurements that can provide and ensure foolproof security in different organizations....
11 Pages (2750 words) Essay

The Biometric System and Its Use

biometric identification sounded like a way to prevent unauthorized users from accessing company property or info.... As of now it is being said that it'll be almost impossible to change the biometric features of human body, which in turn will help the security people to prepare a reliable database and identify the people with criminal background.... One of the most notable one existing today is “identification” of individuals/beings.... But, the extent to which it has made us safer is still being debated. While on the one hand we have advanced security gadgets, on the other the acts of biometric technology is an effort to diagnose the problems and fill some of the loopholes in the security setup....
4 Pages (1000 words) Essay

The Current Efforts to Implement biometric Identification

The paper 'The Current Efforts to Implement biometric identification' presents biometric authentication which refers to the use of personal identification characteristics in association with information technology for the purposes of verification, security, and tracking.... This essay will review the current efforts to implement biometric identification on a universal basis in the EU in the context of human rights and civil liberties to determine if the current application of policy is threatening to the privacy concerns of individuals....
10 Pages (2500 words) Case Study

Biometric Technology in Singapore

While verification involves "one-to-one" matching to determine whether there is a match between the persons presented biometric and biometric templates in a database, identification involves "one-to-many" matching where available biometric is compared with a database to establish the identity of a person.... to establish biometric presented does not match with available database (Rosenzweig, Alane Kochems, and Ari Schwartz, 2004).... Biometrics technology has emerged as an effective weapon in this game, and identification of each and every individual entering a state and safeguard own territory from becoming a terrorist breeding ground or a target has become a foremost priority for the governments today....
8 Pages (2000 words) Coursework

Biometrics' Help to Address Crime, Shape Identification, Security

This work "Biometrics' Help to Address Crime, Shape identification, Security and Privacy" describes the development of technologies, beneficial use of biometrics to the society, the influence of security measures.... nbsp;There has been tremendous development in security, identification, privacy, and fight against crime.... It has brought many improvements in areas such as identification, security, privacy, and in combatting crime.... Often known as realistic authentication, it is used in computer science where it acts as a form of identification and access control....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us