StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometrics: Fingerprints, Retina, Facial Recognition, and Iris Patterns - Essay Example

Cite this document
Summary
"Biometrics: Fingerprints, Retina, Facial Recognition and Iris Patterns" paper focuses on the critical analysis of the major problems of biometrics. Life measurement is the basic translation of the word biometrics that has been taken from the Greek language…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Biometrics: Fingerprints, Retina, Facial Recognition, and Iris Patterns
Read Text Preview

Extract of sample "Biometrics: Fingerprints, Retina, Facial Recognition, and Iris Patterns"

Biometrics INTRODUCTION & DEFINITION Life measurement is the basic translation of the word biometrics that has been taken from the Greek language. Since the early twentieth century, statistical development has been the major concern of general science with the inclusion of field of biometrics. For instance, different varieties of wheat were compared with the help of different agricultural experiments, in order to understand the yielding characteristics of the wheat with the facilitation of statistical analyses through biometrics. In this way, a number of sectors have employed the means of biometrics for the determination of efficient methods meant for effective growth. In the present contemporary era of computer science, a different role is being played by the biometrics applications. A particular class of identification technologies has been referred by the high technology sector of the biometrics. In specific, an individual’s identity is determined by the utilization of different technologies that refer to the individual biological traits. In this regard, fingerprints, retina, facial recognition, iris patterns, etc. are some of the major examples of the biological traits that are considered in the field of biometrics. Technical ability of the humans in terms of cataloguing and tracking the biological traits is considered during the selection of individual traits in the contemporary biometric applications. It is observed that a number of biological traits are easy to acquire; however, some are difficult to obtain, which has resulted in the creation of a number of complexities in the field of biometrics. In this regard, a number of experts are endeavoring for the improvement of biometric technology for the advancement of security of life measurements that can provide and ensure foolproof security in different organizations. Today, more reliability has been shown by the fingerprint readers that are available in different markets at very low cost. On the other hand, retina scanners are very costly, and therefore, it will take years to replace the less-accurate fingerprint scanners in different parts of the globe. Nowadays, digital and computer security is confronting immense demand, which has been caused by the security breaches in different organizations around the world. In this regard, a number of studies are being carried out to ensure effective security, which is now one of the major concerns of the present technological globe. (Thieme, pp. 25-28) In the dominion of computer security, physiological and individual human characteristics are measured by the authentication techniques in the field of biometrics. In other words, distinctive identification purposes can be fulfilled by the utilization of unique personal attributes, which have been mentioned earlier in the paper, such as fingerprint, retina, iris patterns, voice recognition, etc. Although it is still the beginning of the field of biometrics, it is expected that a critical role will be played by the biometrics systems in the years ahead. Nowadays, secure computing environments are utilizing some of the authentication methods, such as swipe cards, fingerprint scanners, and password machines, in order to secure their places and resources. Today, a fingerprint scanner is now included in some of the high-tech personal computers that authenticates the users by their index fingers, rather than a regular password. (Zhang, pp. 18-19) On the other hand, some computers have divided the level of access by the implementation of mixed authentication processes that include fingerprint scanner, as well as, a passphrase. In this regard, sensitive files can be secured at beginner levels, and later levels of access can be provided to the users with higher levels of codes. Briefly, in terms of definition, when the identity of an individual is verify and authenticated by the utilization of physical and physiological distinctive and robust characteristics by an automatic and measurable process, it is referred as biometrics. Such process ensures foolproof security to the different organizations, and has become a critical concern of major companies around the globe. (Bolle, pp. 17-19) In the field of biometrics, it is very imperative that the biological traits should be measurable, which is the basic requirement of the biometrics. For instance, it is very important that the sensors should be easily available with the biological characteristics, in order for acquiring digital format of the individual’s characteristics. In the abovementioned definition, term of robustness has been utilized by the experts. In order to understand the robustness, it is something that investigates the significant changes that occurred over time and biometrics applications should not avoid the robustness of the characteristics. For instance, chemical exposures, injuries, occupational utilization of individuals, etc. often result in a number of changes of physiological traits, which may result in the inaccuracy of the results. In terms of robustness, iris and retina patterns are considered the most accurate and reliable means of traits that change very little during the lifetime of an individual, as compared to the voice, face, and fingerprints. (Woodward, pp. 73-74) Until now, biometrics has only been used to identify, verify, and authenticate the humans around the globe, and animals and other species have not been included in this field. In the simple process of biometrics, a sample of biological or physiological trait is compared with the samples in a database, in order to identify the person X with the specific person in the records. Such simple process has been employed in a number of locations in different parts of the globe. Moreover, it has become a regular mode of identification of the individuals, such as airports, educational institutions, prisons, banks, etc. Prisons and jails are the most common places that are employed with such authentication facilities of biometrics, as the prisons are enrolled with a limited number of individuals that can easily be managed by the authorities. However, such simple process often turns into complex ones due to mismanagement and unlimited number of individuals during the surveillance. (Zhang, pp. 39-41) WORKING OF BIOMETRICS Until now, the paper has defined and discussed the basic definitions of biometrics that have been provided by different experts and biometrics professionals. Now, the paper will discuss the working process of biometrics, in order to understand it in a detailed manner. A database and different procedures of measurement comparisons are usually included in the software system that is combined with a scanning interface in a biometric device. When a biometric interface is interacted with an individual, negative or positive reaction will be given by the software system. Different software systems are meant for different purposes. For example, a positive match in the database may just be acknowledge by the system, and another system may provide access to the individual upon a positive response. (Bolle, pp. 22-24) Similarly, a negative response may deny the access or just provide the negative results. For instance, a software system may ask the authorities to record the traits of the scanned individual for the future purposes upon a negative response. On the other hand, a software system may ask the authorities to arrest the individual upon the negative response. Therefore, every software system in the field of biometrics performs different purposes according to the needs and requirements of the organization. For instance, an educational institution may employ the biometric application to mark the attendance of the students through their fingerprints. On the other hand, a bank may take the fingerprints of all the people that are entering and exiting the bank premises for safety procedures. (Lockie, pp. 37-39) Today, thousands of organizations and companies are utilizing different types of biometric devices around the globe. While identification and authentication is the major function of all the types of biometric systems, a unique style is employed by different systems for performing their tasks. Criminals and citizens are being tracked by the fingerprint traits since years. In specific, friction ridges are present on the tip of every finger, which is used for acquiring fingerprints. Friction ridges patterns will be similar with a naked eye; however, no friction ridge can be similar to each other, which has resulted in its wide utilization for the authentication purposes in the field of biometrics. Nowadays, friction ridges patterns are utilized by the forensic departments to match the acquired fingerprints with their databases, in order to catch the culprits. (Woodward, pp. 24-26) The concept of fingerprinting has been taken to advanced heights by the utilization of biometric systems. An especially touch-sensitive scanner acquires the ridges patterns on the fingertips and a digital image of the pattern is obtained through the software system. Nowadays, advanced biometric applications perform the abovementioned tasks in less than a second, which has resulted in its effective utilization at different public places, such as airports, banks, etc. Moreover, computers, keyboards, and consumer devices are now equipped with the fingerprint scanners for advanced security and privacy. In this regard, now personal computers can be prevented from unauthorized access with the utilization of fingerprint scanners, which has become possible due to the advancement in the field of biometrics. In other words, the role of an encryption key is now played by the fingerprints with the help of different software systems. (Ashbourn, pp. 43-47) The field of biometrics has improved with one of the major recent developments, the creation of face recognition software. Same principles of fingerprint scanning are considered by this software; however, functions are more complex in the face-recognition software systems, as compared with the fingerprint ones. Scanning hardware and software systems are combined in the face recognition software like the fingerprint systems. However, high-resolution digital cameras are used by the hardware that performs the tasks of acquiring the high-quality images of people coming in front of it. In specific, advanced statistics are utilized by the camera and software for the identification of face patterns in this kind of technology. One of the most common strategies used in the face recognition software is that a matrix table is created by breaking the image into a grid. (Jain, pp. 23-25) Subsequently, each grid region shows different amount of darkness, which can be matched with the scanned grid. Moreover, a set of unique equations is obtained by the simplification of table with a mathematical technique, referred as eigenspace. A topographical map is created by the eigenspace technique in a face recognition device. Furthermore, distance of nose tip to cheeks, and cheeks to eyes is calculated by the mathematical technique, which facilitates the matching process of an individual. All such steps result in the complexity of this technology, which is one of the reasons that it has not been employed for regular utilization around the globe. (Chirillo, pp. 29-34) Amazingly, the face recognition software has been very successful in the cases of criminals and their surveillances, where police authorities have to search and identify the criminals at the public places. At these places, it becomes very difficult for a human to identify a criminal, as most of the people do not know the criminals personally, and therefore, there are millions of chances of inaccuracy by the humans. At this point, a vital and crucial role is played by the face recognition software that identifies the individual regardless of lighting conditions, different dressing and hairstyles, skin tone, beards, etc, which could affect the humanistic technique of identification and authentication. (Thieme, pp. 69-72) Las Vegas casino is one of the major examples that have employed the face-recognition software systems in their premises for record the facial images of gambles for security reasons. In this way, burned gamblers can be identified and escorted out of the casinos, even before they start gambling on one of the tables. Besides the facial identification technology, the field of biometrics has advanced significantly with the introduction of retina and iris patterns scanner, which is one of the most accurate and high-tech technologies in this field. A distinct pattern is created by the scanning of retina and iris patterns, which is far more accurate and distinctive than the fingerprint or facial patterns. (Ashbourn, pp. 62-64) However, such advancement has brought a number of complexities and side effects, which will be discussed in the following section of the paper. SIDE EFFECTS A number of side effects have been observed in the applications and devices of biometrics; however, they have not been negative. Annoyance and costs are some of the most destructive side effects of the biometric applications that have created problems for the implementation of its technologies in the present world. It is very important that side effects of the biometric technologies should be discussed, which can help in the incorporation of future generation of the security devices in the years ahead. In specific, cost is the major issue that has slowed down the process of employment of the biometrics applications. In the field of biometrics, applications purchase is not the only problem related to the cost; however, maintenance of these products requires a more costly process, which cannot be afforded by every one. (Woodward, pp. 21-22) A high level of trained management is required by all the biometric technologies, which could throw the budget far away from its limitations. It is observed that sensors are often built up with the layers of hand cream, dust, etc. due to its frequent utilization, such as in case of fingerprint scanners. In the result, it is very imperative that routine cleaning should be arranged by the management to upkeep the devices, which is another costly process related to biometrics. Such process cannot be avoided, as its avoidance will result in the inaccurate results, which will create more complexities for the organizations. (Zhang, pp. 44-47) Complex biometric applications are also infected by the technical problems, which is another side effect of the biometrics. One of the facts of biometrics technologies is that large databases and catalogues are the main source of authentication of such devices. It is observed that such databases are degraded over a period, which could be destructive for the organizations. A number of experts have indicated that increment in the size of databases results in the increase of response time, as well as, the accuracy, which are the two important objectives of the biometrics technologies. In other words, utilization of biometric systems is inversely related with the performance of its systems. (Chirillo, pp. 55-57) Costs, technical problems, and maintenance difficulties might be some of the regular side effects of present technologies. However, one of the surprising side effects of biometrics technologies is the medical and health concern related with the biometrics. It is observed that medical privacy of the individuals is often invaded during the utilization of biometric systems, and they feel violated upon the confrontation of such devices. For example, retina patterns of an individual may start changing during the diagnosis of certain medical illnesses, such as diabetes, etc. In the result, individuals with such illnesses might be rejected by the retina scanners, which could lead to inaccuracy and medical concerns of the individuals. Furthermore, perceived health risks due to the utilization of biometric security applications is another major medical related side effect of the biometrics. It is observed that retina scanners are often criticized and not welcomed by the individuals, as it is perceived that it could damage the eyes. In this regard, it is very important that awareness should be given to the individuals before the employment of such technologies in the organizations. As the biometric security applications are surrounded with these issues, it is indicated that the implementation of such devices and technologies will not be simple in the years ahead. In this regard, it is very imperative that staff of organizations with such facilities should be trained and informed of every aspect of such technologies, which may facilitate the successful implementation of the biometrics. (Bolle, pp. 30-33) CONCLUSION Since ancient times, different methods have been employed for the identification of people, such as signatures, writing patterns, facial features, etc. Nowadays, the task of recognition, identification, and authentication has become automatic with the creation of biometric systems and technologies. Hand geometry, iris patterns, and voiceprints are some of the innovative techniques of identifying and authenticating the individuals. Different strengths and weaknesses are present in such systems, which have been discussed in this paper. A number of experts have indicated one percent of chances of inaccuracies in such systems, especially in the facial recognition techniques, which could provide similar matches and create complexities. In this regard, it is the responsibility of humans to interact with these technologies, in order to acquire successful results. (Ashbourn, pp. 79-80) As earlier mentioned in the paper, utilization of such devices is inversely proportional to its performance, therefore, it is very important that fingerprint and retina sensors should be maintained by trained staff, which could avoid the chances of forgery and inaccuracy. Presently, the field of biometrics is playing a vital and crucial role in ensuring security in thousands of organizations, educational institutions, banks, prisons, etc. in various countries of the globe. However, people are still not aware of its effectiveness and inaccuracies, which should be informed by the authorities, in order to equip our society with such security equipments that may prevent our system from different vulnerabilities. Conclusively, it is hoped that the paper will be beneficial for the better understanding of the field of biometrics and its technologies for students, teachers, experts, and nonprofessionals. Works Cited Anil K. Jain. Biometrics: Personal Identification in Networked Society. Springer, 1999. David Zhang. Advances in Biometrics. Birkhauser, 2006. David Zhang. Automated Biometrics. Springer, 2000. John Chirillo. Implementing Biometric Security. Wiley Publishing, 2003. John D. Woodward. Army Biometric Applications. Rand Corporation, 2001. John D. Woodward. Biometrics. McGraw-Hill Professional, 2003. Julian Ashbourn. Practical Biometrics. Springer, 2004. Mark Lockie. Biometric Technology. Trans-Atlantic Publications, 2003. Michael Thieme. Biometrics: Identity Verification in a Networked World. John Wiley & Sons, 2002. Ruud Bolle. Guide to Biometrics. Springer, 2003. Word Count: 2796 Words Checked by Copyscape.com and Turnitin.com Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Biometrics Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Biometrics Essay Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/miscellaneous/1546118-biometrics
(Biometrics Essay Example | Topics and Well Written Essays - 2500 Words)
Biometrics Essay Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/miscellaneous/1546118-biometrics.
“Biometrics Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/miscellaneous/1546118-biometrics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometrics: Fingerprints, Retina, Facial Recognition, and Iris Patterns

Biometrics use in government and corporations

There are various biometric technologies available and though this paper will look into each of them, the major focus would be on fingerprint and iris biometrics.... As compared to its counterpart, Cole (2005) further appreciates the accuracy that organizations could enjoy if the recent iris biometrics technology would be used instead.... The application of biometrics technology varies in various organizations and countries, with the aim being identification and verification....
16 Pages (4000 words) Research Paper

Computer Physical Security

In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentification purposes'1.... he majority of biometric systems operate in the following way: the digital mark of a fingerprint, an iris or a voice is stored in the system database.... So we may define a biometric system as 'a pattern recognition system which recognizes a user by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user'2....
4 Pages (1000 words) Essay

Introduction to Biometric Identification Database

Therefore the voice patterns form one of the most dependable biometric measures.... Biometrics is an evolving field of science which deals with establishing the identity of a person based on his/ her biological, anatomical and physiological features like face, fingerprints, handwriting, voice, iris structure, retina, veins, DNA etc.... But the evolution of biometrics in the form of automated identification of finger prints, geometry of hand, iris construction, facial structure, genetic makeup etc....
11 Pages (2750 words) Essay

Specialized Field of Security Management

In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.... According to WebMediaBrands (2009), “fingerprint scanning essentially provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint....
3 Pages (750 words) Essay

How has Identification Technology evolved in society through Biometrics

Banks for instance use biometrics in iris recognition for the security of different account holders (Leeuw 2007).... They are able to tell through use of iris recognition how withdrawals were made from ATMs by different customers.... Government can use biometrics by carrying out facial scan n different criminals.... Among this unchanging characteristics are the finger prints, the retina and finally the skull.... This scientific analysis was first identified in China when different merchants applied this technology in distinguishing the differences in different children using fingerprints....
20 Pages (5000 words) Research Paper

Biometrics Signature Recognition

This article looks at how the technology of Signature recognition and analyses its strong point and flaws.... Common bodily characters contain facial characteristics, iris hand, ear or palm geometry, and retina or fingerprints.... This essay "Biometrics Signature recognition" is drawn to researches information in signature from a statistics synthesis view.... While economical foundations and other commercial establishments largely emphasize the graphic presence of our signature for authentication resolutions, recognition of Signature scrutinizes behavioral characteristics that manifest themselves when we sign our name....
5 Pages (1250 words) Essay

Biometric Authentication Systems

Biometrics ranges from DNA matching, chemical biometric, visual biometric, eyes biometrics ( iris recognition, retina recognition ), finger geometry recognition, Hand geometry recognition, signature recognition, and behavioral biometrics (typing recognition), vein recognition, and gait.... Biometrics recognition is, therefore, the automatic recognition of users based on behavioral and physiological characteristics.... erformance – refers to the achievable recognition speed and accuracy, the resources to be used in achieving the desired recognition accuracy and speed and the environmental and operational factors that affect the accuracy and speed....
10 Pages (2500 words) Essay

The Expertise of Biometrics and Its Classification

A lot of research is still going on to search for how best to use biometric technology on figure prints, and facial, hand, and iris recognition.... The first engages one-to-one assessment of biometric patterns in order to authenticate the individuality of an individual, responding to the query, "Is this being who he/she states to be?... Biometrics utilize processor algorithms to decipher a picture captured of an existing person into a lesser quantity of information, occasionally called a digital pattern, which can then be contrasted adjacent to images stored in a file or to information accumulated on recognition documents....
11 Pages (2750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us