We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Introduction to Biometric Identification Database - Essay Example

Comments (0)
The term "biometrics" is derived from the Greek words "bio" (life) and "metrics" (to measure). Biometrics is an evolving field of science which deals with establishing the identity of a person based on his/ her biological, anatomical and physiological features like face, fingerprints, handwriting, voice, iris structure, retina, veins, DNA etc…
Download full paper
Introduction to Biometric Identification Database
Read TextPreview

Extract of sample
Introduction to Biometric Identification Database

Download file to see previous pages... But the evolution of biometrics in the form of automated identification of finger prints, geometry of hand, iris construction, facial structure, genetic makeup etc. is a relatively new phenomenon. Portuguese explorer Joao de Barros also points out1 the existence of Biometrics in China in the 14th century. Barros narrates that Chinese merchants used to stamp their children's palm prints and footprints on a piece of paper with ink. This way the Chinese merchants used to distinguish the young children from one another. This can be termed as the beginning of the modern biometrics. The recent advances in Information Technology and computing have provided newer dimension to this emerging field. During the last couple of decades biometrics has established itself as a comprehensive tool for establishing Identities and Verification.
In 1890, Alphonse Bertillon, a Parisian police desk, studied body length to identify criminals. Subsequently the method came to be known as Bertillonage method, which relied heavily on measuring the body length. But the method did not last long as there were many false alarms as a result of false identifications. Thereafter, finger printing became the reliable method of identifying the criminals. There are human rights groups and civil liberties advocates argue that increasing use of biometrics has resulted in trespassing into the privacy of all human beings, but the rise in terrorist activities in recent years has forced the defense and security experts to rely heavily on the biometrics for identifying the mischief makers.

Types of Biometrics and their usage
A biometric system is designed to test one out of the two possible hypotheses (Wayman et al., 2005):
(1) That the submitted samples are from an individual known to the system; or
(2) That the submitted samples are from an individual not known to the system.
Applications to test the first hypothesis are called "positive identification" systems (verifying a positive claim of enrollment), while applications testing the latter are "negative identification" systems (verifying a claim of no enrollment).

Biometrics, in general can be divided into two main groups, physiological and behavioral
i. Physiological factors: These factors depend upon the physical structure and appearance of the individual.
Iris Scan: The Iris of an individual is scanned to match it with the stored image. Quite often the iris scan may not come out with actual on if the person is putting on dark glasses, or is suffering from some eye disease.
Fingerprint: This is one of the oldest tried and tested methods of biometrics. In fact the nail is also included for identification in fingerprinting.
Hand: This includes the structure of knuckles, palm and the vascular networking of hand.
Face, Earlobe, Lips: The camera scans the facial structure or the fleshy pendulous part of the external ear or lips of the individual.
Voice: The voice is also one of the most distinguishing features to identify an individual. Therefore the voice patterns form one of the most dependable biometric measures.
Retina: like iris, the retinal structure too provides an insight into the nature and character of the person.
DNA: This method too is quite frequently used in a number of cases to establish the identity of the individual.
Body Odor and Sweat Pores: There are biometric techniques which can sense the ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
National Identification System in the United States
The issue of having National Identity Cards has been a subject of debate for quite some time in the United States. Those in favor state that having national identity cards will improve national security as it will protect the Americans from terrorists, and likewise discourage illegal immigrants from entering the country.
23 Pages(5750 words)Essay
An Introduction to Database Technology and Database Management
Data is a collection of raw and unrefined pieces of information that do not give any meaning, in their present state. It is normally used for analytical purposes and must be organized in a certain manner so as to become useful (Dixon, 2000). It is mostly comprised of facts and figures about certain events and occurrences that require being organized, analyzed and interpreted to give rise to some required information about this events and occurrences.
3 Pages(750 words)Essay
Technological advances in criminal identification procedures
Ever since the discovery of DNA (Deoyxribonucleic acid) in 1954, it has been accepted as a measure of a person's identity as it contains an individual's genetic information (Gans and Urbas, 2002). DNA analysis offers a deeper identification method than traditional identification methods such as fingerprints, blood type, hair color etc.
6 Pages(1500 words)Essay
Macro and Micro Analysis
Consequently most governments have had to re-think their security strategies and allocate special budgets to counter this potent threat of terrorism. Unfortunately, unlike in a conventional war where enemies were known, terrorism has brought conflicts to our very own neighbourhood, and made each and every citizen a potent soldier, victim or even aggressor to challenge, identify, report or fight any indication of a terrorist plot.
10 Pages(2500 words)Essay
Biometric identification
In the United Kingdom, the House of Commons passed a bill that biometric identification cards are to be made compulsory for every citizen by the year 2010. Biometric identification cards contain embedded chips that store personal information about the citizen like name, signatures, photos, facial scans and iris and retinal scans.
1 Pages(250 words)Essay
The kind of technology and networking that exists around us has without doubt made life simpler for us. But, the extent to which it has made us safer is still being debated. While on the one hand we have advanced security gadgets, on the other the acts of
8 Pages(2000 words)Essay
Buometric ID system in Europ
Traditional biometric details include human fingerprints, blood types, retinal scans, and facial recognition that are input by technological devices
8 Pages(2000 words)Essay
Biometric Identification and Privacy Implications
Some of the advantages of biometric identification are that it can be rapidly deployed as a function of identifying and credentialing a large number of individuals within a
1 Pages(250 words)Essay
Introduction to Database Systems
procedures are usually precompiled and can be simple selection query or complex ones to do several tasks like selection, joins, insertion or deletion simultaneously. Stored procedures contain a procedure name, input/output parameters, and a procedure body. User defined
1 Pages(250 words)Essay
Biometric identification
34).This appropriate security is also required to regulate access to an extranet or an intranet, or to transact business through the internet. Determining effective means of realizing this proper security is also important. The fear of internet security has been one of the
8 Pages(2000 words)Essay
Let us find you another Essay on topic Introduction to Biometric Identification Database for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us