Free

Biometric Centralisation vs Biometric Balkanization: which is better - Essay Example

Comments (0) Cite this document
Summary
In biometric centralization, only a single biometric method is applied in authentication, while in biometric balkanization, more than one biometric…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Biometric Centralisation vs Biometric Balkanization: which is better
Read TextPreview

Extract of sample "Biometric Centralisation vs Biometric Balkanization: which is better"

Biometric Centralization vs Biometric Balkanization: which is better? By: Computer sciences and Information technology of The Institution
1. Biometric Centralization vs Biometric Balkanization
In the study of the various methods of applying biometric methods in authentication, it is better to apply Biometric Balkanization. In biometric centralization, only a single biometric method is applied in authentication, while in biometric balkanization, more than one biometric method is applied. It is an application of diversification of biometrics in authentication and identification as applied in multiple applications (Crawford 2002, p. 54).
2. Advantages of Balkanization Against Centralization
2.1. Flexibility
Biometric Balkanization provides maximum flexibility to the users a system. The users can customize some of the biometric programs to meet their specific preferences, considering limited resource availability (Farokhi et al 2014, p. 31). Again, it is easier for a user to decide on the most appropriate methods to use in the authentication and identification. For a user who receives telephone instructions for a transaction will prefer to use voice verification (Brunelli & Poggio 1993, p. 52). On the other hand, Centralization has fixed choice or choices of biometric methods to apply for all situations.
2.2. Synergy
Biometric Balkanization provides synergy to the interests of the users of the system. When many biometric technologies are applied, individuals do not need to identify themselves everywhere since there are many ways to identify them (Kimmel & Sapiro 2003, p. 34). At the same time, individual citizens acquire safety for their private information. In centralization, a single biometric technology is used for all purposes, some of which may not require them.
2.3. Privacy Enhancement
Biometric balkanization operates as multiple identities for a single individual, each method being different from the other, and with different relevance. It therefore offers better governance on security and privacy. On the other hand, centralization has limited capacity to provide privacy in dynamic authentication systems.
References
Farokhi, S., Shamsuddin, S M., Flusser, J., Sheikh, U.U., Khansari, M., Jafari-Khouzani & K 2014, Near infrared face recognition by combining Zernike moments and undecimated discrete wavelet transform. Digital Signal Processing 31 (1).
Crawford, M 2002, "Facial recognition progress report". SPIE Newsroom, p54.
Brunelli R & Poggio, T 1993. Face Recognition: Features versus Templates, IEEE Trans. on PAMI, (15)10: p42-52.
Kimmel R & Sapiro G 2003, The Mathematics of Face Recognition. SIAM News, p34. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Biometric Centralisation vs Biometric Balkanization: which is better Essay”, n.d.)
Biometric Centralisation vs Biometric Balkanization: which is better Essay. Retrieved from https://studentshare.org/information-technology/1676735-biometric-centralisation-vs-biometric-balkanization-which-is-better
(Biometric Centralisation Vs Biometric Balkanization: Which Is Better Essay)
Biometric Centralisation Vs Biometric Balkanization: Which Is Better Essay. https://studentshare.org/information-technology/1676735-biometric-centralisation-vs-biometric-balkanization-which-is-better.
“Biometric Centralisation Vs Biometric Balkanization: Which Is Better Essay”, n.d. https://studentshare.org/information-technology/1676735-biometric-centralisation-vs-biometric-balkanization-which-is-better.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Biometric Centralisation vs Biometric Balkanization: which is better

Biometric Authentication

...? Biometric Authentication (Insert Introduction The era that we live in is computer centered. This means that almost everything, if not everything, relies on some computer technology to operate. The number of accounts that an individual operates are increasing by the day and consequently, so are the passwords that grant access to these websites and accounts. However, this does not guarantee safety for the individual’s property and data simply because of the rising number of identity theft cases and data disclosure cases. IT developers have therefore designed several technology software which authenticate or grant an individual access to an account by virtue of a physical character such as a fingerprint. This kind of authentication... is what...
7 Pages(1750 words)Essay

Biometric Authentication

One’s fingerprint, hand, or face recognition senses such specific details as ridges, orientation, as well as other features of the fingerprint. DBS is thus an effective technology offering optimal solutions towards the safety of responsive areas, thereby meeting the demands of the clients for high security whilst maintaining litheness (Nanavati et al 2002). According to Jain et al (1996), a number of factors underscore the inevitability of a DBS. First, DBS requires that a recognition trait must be universal. This implies that all people must possess a chosen biometric, with each person having a distinctive one. Secondly, the chosen biometric, in every human being, must be stable. Role-based admission management is a fundame...
7 Pages(1750 words)Essay

Biometric

...authentication. Therefore, the research proposal in this case is to identify alternatives for the password-based authentication used in most smart devices today. This kind of authentication is vulnerable and can be compromised hence a proposal to focus and introduce better authentication ways i.e. biometric that uses one’s unique biological and psychological features. Hence the research question is; can Voice and Whispered Biometric Authentication provide a more secure way for ones data in smart device than the current password-based authentication? II. INTRODUCTION Biometric authentication is the automatic identification of living individuals by using their...
4 Pages(1000 words)Research Paper

Biometric Security

...-prints, hand, face, earlobe lips, voice, retina, DNA, body odour, sweat pores etc. The data thus collected is then stored in 'template' forms in memory in a centralised database. These details can also be stored in the smart Identity cards being carried by the citizens. The smart card stores the info with the help of RF tags. The Biometrics ids are then used in two ways. If the individual carrying the Biometric identity card, his or her records are matched against the details stored in the database. If all parameters are matched, the person is allowed easy access, otherwise further security checks are taken up. Such measures are used when the person enters a nuclear establishment, or an...
14 Pages(3500 words)Essay

Biometric identification

...EXECUTIVE SUMMARY: Biometric identification refers to identification procedures by means of biological characteristics like facial patterns, speech or finger prints. Today biometric identification has been implemented in to some extent in Brazil and Canada. In the United States too, it has received mandate with the government trying to implement it. In the United Kingdom, the House of Commons passed a bill that biometric identification cards are to be made compulsory for every citizen by the year 2010. Biometric identification cards contain embedded chips that store personal information about the citizen like name, signatures, photos, facial scans and iris and retinal...
1 Pages(250 words)Essay

Biometric Security

...and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.” SearchSecurity.com (2008) These have several applications including time attendance, access control, identification card, security systems, server rooms and data centers. The advantages of this system are: easy to use, removes proxy punching, prevents identity theft, no recurring costs on cards, better returns on investment and instant reporting. (BioEnable 2007) The objective of this paper is to discuss...
4 Pages(1000 words)Essay

Biometric System

...in place would mean that the government has the ability to clearly and properly identify each and every person living within the country and thus have his records, which would further lead to a large bout of development as they would be able to understand the situation of different people better. The government also tried to keep a check on terrorist activities and thus provided that having such a system in place would really help to curb the same. In the United Kingdom, efforts were made and the majority passed the implementation of the bill for the introduction of biometric cards in the Parliament. However, there was a great amount of information leaked regarding the difficulty that the Parliament was...
6 Pages(1500 words)Essay

Biometric Authentication

...Biometric Authentication (Insert Biometric Authentication The era that we live in is computer centered meaning that almost everything, if not everything, relies on some computer technology to operate. The number of accounts that an individual operates are increasing by the day and consequently, so are the passwords that grant access to these websites and accounts. However, this does not guarantee safety for the individual’s property and data simply because of the rising number of identity theft cases and data disclosure cases. IT developers have therefore designed several technology software which authenticate or grant an individual ...
7 Pages(1750 words)Essay

Biometric Authentication

...Evaluation of the Viability of Biometric Authentication For Online Transactions Presented By: Computer Sciences and Information Technology Lecturer’s Name Institution’s Name Location Date 1. Viability of biometric authentication methods for online transactions Biometric Authentication is generally a more secure means of optimizing data security on online transaction as it minimizes the risk of impersonation and identity theft. In essence, biometric identification implies that the owners of the information are present in person as it identifies unique features such as eyesight, fingerprint, and voice data (Oezcan 2003, p. 11). Unlike password and signatures which are easily stolen by third parties, biometric authentication relies... on the...
2 Pages(500 words)Essay

Biometric identification

...person who uses the system. Also, it is possible for the internet user to link to the RAS server and transfer encrypted data to the next server or another computer via Point to point Tunneling Protocol, PPTP (Jain et al. 96). Moreover, the RAS is equipped with its safety net, like user callback that is strictly for a particular phone number to find a connection, as well as user identification, user permissions, , and encrypted passwords. Biometrics offers greater security to financial assets and personal data, which are more essential. They can better protect most vital data, which could bring the most significant harm if reached by a wrong person (Jain et al. 97). An example of the most excellent...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Biometric Centralisation vs Biometric Balkanization: which is better for FREE!

Contact Us