StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

New Possible Industries for Biometric Technology - Case Study Example

Summary
The paper 'New Possible Industries for Biometric Technology' discusses many technologies that have been implemented in the past two decades. Some of these technologies have proved to be impractical, while other technologies were invented before people were ready…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful

Extract of sample "New Possible Industries for Biometric Technology"

Future of Biometric Technology Your name: Institution name: Introduction There are many technologies that have been implemented in the past two decade. Some of these technologies have proved to be impractical, while other technology were invented before people were ready (Monrose and Rubin, 2005). But some of these technologies have actually been implemented with ease and success. Iris scanning is a fine example of biometric technology that is now being commercialized at a fast phase (Jain, 2007). Although, this concept existed for long, powerful cameras and computers are now affordable to make imaging a human iris (Ratha, Connel, and Bolle, 2008), creating an arithmetic template viable for wide usage, and selecting unique minutiae points (Feng, 2006). The pattern of the human iris has remain constant throughout life (Jain, Bolle, Pankanti, 1999). Iris scanning has been used in access control applications but is approaching a price point where it has become practical for use in attendance and time applications (Hong and Jain, 2008). The only barrier to overcome is the apprehension of having an image of one’s iris captured. Biometric security such as voice, face and fingerprint recognition has been set to hit the world and as a high-tech firms market this system as convenient and easy to use, this has been according to Prof Steven Furnell, a prominent IT security systems experts (Ratha, Connel, and Bolle, 2008). Prof Furnell last year wrote an article in the journal of Biometric technology Today, which details new facial recognition and fingerprint recognition system will be available on the home button of Android system or Face Unlock and IPhones (Jain, Bolle, Pankanti, 1999). Prof Furnell argued that biometric technology can work well when there is right conditions (Jain, 2007). But reading current information and published papers on biometrics systems, many people are able to think that the main reason for the use of this application is for security (Feng, 2006). This argument have been supported by a lot of politicians who are responsible for spreading information on biometric applications can help locate criminals, help in fight against terrorism, etc (Hong and Jain, 2008). This is not wrong, indeed, biometric devices that have been employed in person’s identity recognition are common in areas such as train stations, police stations, airports and other sensitive areas that need high security. However, there are a number of reasons to believe that biometric technologies have changed the life of people and the societies they live in, mostly for simple reason that biometric technologies have been more convenient compared to other technologies for personal identity authentication (Feng, 2006). The impact of biometric technology is being noticed nowadays, especially when it is related to applications such as logical access and physical systems, transportation, finance, and so forth (Hong and Jain, 2008). This study will try to highlight new possible industries for Biometric technology, with emphasis given on the industry that will have more impact- technology wise- to the future societies. Authentication It is important to know that in few years, all important document will have some form of biometric data or information (Monrose and Rubin, 2005). But in future people should expect their physical documents or data will no longer be needed (Hong and Jain, 2008), because, in every situation, document authentication of personal information or data is needed, biometric readers will be able to connect via network (Monrose and Rubin, 2005). Attendance and Access control In future, biometric system is predicted to gain acceptance in all kinds of attendance control systems and access control applications (Fierrez-Aguilar, 2007). In near future, people can expect to see biometric systems being employed in some many applications such as in device, homes, machines, computers, and so forth (Carlisle, 2009). In fact, biometric technology devices is seen to provide the largest market in terms of amount of hitech devise that are being installed by people (Jain, 2007). However, a lot of these devices have replaced the existing control methods and access technologies, and they have provided increased security and are convenience to the users implementing these systems (Feng, 2006). In the future, it is said that there will be no need to carry personal identification documents, carry their keys and so forth (Fierrez-Aguilar, 2007). Furthermore, the use of biometric devices will add to the security apparatus: Pre-cluding the possibility of unauthorised use of technologies or equipment, or theft (Hong and Jain, 2008). Biometric technologies have given people new quality of security access systems and solutions, at same time it has given us new markets and new opportunities (Ratha, Connel, and Bolle, 2008). Travel Control As a result of numerous reason, there have been an increased requirement to have passengers travelling through airports, in ferries, and even trains to be personally registered (Feng, 2006). Today these identifications checks have been driven mostly by visa regulations, security concerns such as terrorism, and so forth (Hong and Jain, 2008). And because passenger traffics at the airports and train stations is already increasing each time and has been predicted to increase at an alarming rate, organizations that are directly involved in the control and management of transportation system/infrastructures have been found to be interested in automation and rationalization of their processes and their procedures (Monrose and Rubin, 2005). Financial Authorization In its application in the financial sector, it is known that money in term of coins and notes are being replaced fast virtually (Carlisle, 2009). In today business environment, this has happened in the form of bank or, pocket electronic money, or credit cards, and so forth. However, in most situations, the physical transaction is not important because money in the financial institutions can be directly connected to rightful owners (Monrose and Rubin, 2005). Spreading of biometric authentication in the financial sector such as in banks have really decreased the need for physical transactions such as the use of credit cards since virtual money transactions usage connect people directly at a click of a mouse (Hong and Jain, 2008). This has resulted in change in people’s behaviours, in addition, the government have the ability to surveillance on the money movements. In the near future, two possibilities are expected to occur in response to this situation (Feng, 2006). First, people perception on new technology can be against the use of virtual money, or people may try to change the taxes and economic system that allow them to live exclusively on virtual currency system (Fierrez-Aguilar, 2007). The second solution, or development is that virtual money has been predicted to evolve in near future, but it also predicted to be better than before (Carlisle, 2009). Biometric technology will make many of these operations to be convenient and easier to the masses. Remote authorisation Remote authorization has brought significant change in the society and its people because it has created new market for the people, and it is called the remote or virtual authorization (Fierrez-Aguilar, 2007). The emergence of existing technological devices and the future development with biometric technology applications will allow people to have opportunities that will allow them to make wide range of transactions such as voting, purchasing, access authorizations, decision making and so forth, via networking structures, from remote or locations (Fierrez-Aguilar, 2007). In the near future, it is predicted that people will not require to present themselves in a given area or location in order to authenticate themselves or to do specific action or deed (Jain, Hong and Pankanti, 2000).Indeed, this biometric capability has been made possible nowadays (Feng, 2006). However, the viability of remote usage on a large scale such as in voting, still has it challenges and it will be made possible if appropriate biometric application have been put into place without the major disadvantages that have affected the existing biometric solutions. Democratic decision are being made every day at a lower cost, even in already developed countries. The possibility of low cost remote voting by people will not only open up democratic space but also it will increase the frequency in voting activities among the citizens in a particular country (Fierrez-Aguilar, 2007). It can only be speculated today, but this perspective can contribute to democratic changes in most countries especially in Africa that are undemocratic- all will be facilitated through introduction of accurate, reliable and high speed biometric technological devices that will enable remote authentication of voter (Feng, 2006). In future, the corresponding changes in political systems and power structures will provide potential for nations to have a free and fair democratic representation (Monrose and Rubin, 2005). In associated with changes in money transfer and banking technique remote authorisation and voting will also significantly have influence over economic and taxation system: control of money that is being transferred from one person to another will be made easier (Ratha, Connel, and Bolle, 2008), but this will make persons with stronger interest in controlling politicians with regard with the question of lowering the cost that is incurred by the government operations and spending taxes (Jain, 2007). While, the possibility of authorising money transaction remotely will cause additional changes in other transactions that need authorization, which currently implies personal contacts (Feng, 2006). This will also have positive effect on people’s lives- such as it will minimize or eliminate the need for many personal contacts (Jain, Hong and Pankanti, 2000). Such kind of operations will be made easier and it has been made possible to be done automatically. Action Control In the case of potential dangerous situations, it will be good to control the use of devices in order to prevent unauthorised persons gaining access on them or use them or track, in a specific situation (Monrose and Rubin, 2005) (Saylor, 2012). This is the case of vehicles that shouldn’t be used by individuals who are already drunk or any individual who do not possess a driving license, or dangerous machines or tools that should be used by persons that have appropriate knowledge or know how (Saylor, 2012). For instance, in the case of weapon handling; it is important if the person handling the firearm should be an authorised person (Saylor, 2012). This will enable the concerned parties such as the government to track a specific weapon that has been used for a crime (Jain, 2007). This market has been seen to be more specific, because biometric technology used for control purposed should have special characteristics or features. For example, in the case of firearms they should be reached in real time (Feng, 2006). In practical all cases should integrated elements such as handles, triggers, steering wheels, and so forth. but in some situation biometric technology should be able to recognize the condition of the end user, Which devices can occur on biometric market in the future? It is not easy to try and predict new development, but the following devices are expected to be used in near future: A very realistic development will be the development of techniques that will be able to recognize people, observing their behaviour (Hong and Jain, 2008). It can be attested that such developments are already being used and have created different approaches that have been utilized even in simple devices (Jain, 2007). For example, the so called multimodal biometric devices have been used in voice, face and individual body shape recognition (Jain, Hong and Pankanti, 2000). In near future, society should expect within a short time large amount of biometric devices (Monrose and Rubin, 2005). But special role has been played such as software that are able to evaluate the behaviour and knowledge of individuals in ways that are similar to human beings are able to do exactly this (Feng, 2006). The second development that is expected to cause the awareness of biometric technologies that have already been proposed, that biometric devices are not able to recognize real and living features should be replaced by those devices that cannot be cheated or hacked (Monrose and Rubin, 2005). In future, ultrasonic technology for finger recognition will be a big thing because it has many advantages to people: it allows the integration of sensor in existing elements, such as screens, handles, windows, and so forth (Saylor, 2012). In addition, it has been found to offer additional functions, such as touch screen, information readers and mouse pad (Monrose and Rubin, 2005). In future, it will be possible to use methods and techniques for remote recognition of people. Another important technique may be developed in near future will be based on acoustical holography, this technique will use air ultrasound (Hong and Jain, 2008). It is expected that a kind of camera will be proposed and will be able to measure 3D structure of any object structure, and even be in a position to measure the vibration of the object (Jain, 2007). This kind of technique will be much cheaper and better than optical devices for 3D measurements (Saylor, 2012). The measurement of vibration of the face surface of an object or a person; it will be difficult to fool the device through voice fooling (Monrose and Rubin, 2005). The incorporation of this techniques into biometric purposes will greatly improve the biometric devices that are used in tracking of mosvements. It will be possible that future development of infrared visualization techniques and THz electromagnetic waves techniques will add up new features especially to biometric devices, used in public places, such as in train stations and airports (Jain, 2007). In addition, a techniques that cannot be taken for granted will be the creation of a powerful software for biometric technology devices that will enable to recognize persons remotely, through the network and it will make any kind of fraud not to be possible (Feng, 2006). In near future, we will see that realization of such technique that will be based on holography for finger recognition. Conclusion Future development of biometric devices will completely change the world (Jain, Bolle, Pankanti, 1999). Biometric technologies will not only be used to make human beings life easier, but also it will be for perfect invigilation (Jain, Bolle, Pankanti, 1999). This will not hinder the development of biometric techniques. Almost every technology can be used for good and bad purposes – this depends only on people using it. References Carlisle, J. (2009). "Eyeball to Eyeball: the Use of Biometrics in ANGELS & DEMONS". In Burstein, Dan; de Keijzer, Arne. Inside Angels & Demons: The Story Behind the International Bestseller. Vanguard Press. pp. 374–383. Monrose, F and Rubin, A.D, (2005). “Keystroke Dynamics as a Biometric For authentication”, Future Generation Computer Systems, Vol. 16, No. 4 351-359 Feng, G. (2006). "When Faces Are Combined with Palmprints: "A Novel Biometric Fusion Strategy, Proceedings of First International Conference, ICBA 2004, Springer, 701-707 Fierrez-Aguilar, J. (2007). "Fusion strategies in Biometric Multimodal Verification", Proceedings of International Conference on Multimedia and Expo, ICME. Hong, L and Jain, A. (2008). "Integrating Faces and Fingerprints for Personal Identification", IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(12), pp. 1295-1307. Jain, K. (2007). Ross,“Information Fusion In Biometrics”, Elsevier, Pattern Recognition . Jain, A., Hong, L., & Pankanti, S. (2000). "Biometric Identification". Communications of the ACM, 43(2), p. 91-98 Jain, A.K.; Bolle, R.; Pankanti, S., eds. (1999). Biometrics: Personal Identification in Networked Society. Kluwer Academic Publications. Ratha N. K., ConnelJ. H. l, and Bolle R. M. (2008), "Enhancing security and privacy in biometrics-based authentication systems," IBM systems Journal, vol. 40, pp. 614–634. Saylor, M. (2012). The Mobile Wave: How Mobile Intelligence Will Change Everything. Perseus Books/Vanguard Press. p. 99 Read More

This study will try to highlight new possible industries for Biometric technology, with emphasis given on the industry that will have more impact- technology wise- to the future societies. Authentication It is important to know that in few years, all important document will have some form of biometric data or information (Monrose and Rubin, 2005). But in future people should expect their physical documents or data will no longer be needed (Hong and Jain, 2008), because, in every situation, document authentication of personal information or data is needed, biometric readers will be able to connect via network (Monrose and Rubin, 2005).

Attendance and Access control In future, biometric system is predicted to gain acceptance in all kinds of attendance control systems and access control applications (Fierrez-Aguilar, 2007). In near future, people can expect to see biometric systems being employed in some many applications such as in device, homes, machines, computers, and so forth (Carlisle, 2009). In fact, biometric technology devices is seen to provide the largest market in terms of amount of hitech devise that are being installed by people (Jain, 2007).

However, a lot of these devices have replaced the existing control methods and access technologies, and they have provided increased security and are convenience to the users implementing these systems (Feng, 2006). In the future, it is said that there will be no need to carry personal identification documents, carry their keys and so forth (Fierrez-Aguilar, 2007). Furthermore, the use of biometric devices will add to the security apparatus: Pre-cluding the possibility of unauthorised use of technologies or equipment, or theft (Hong and Jain, 2008).

Biometric technologies have given people new quality of security access systems and solutions, at same time it has given us new markets and new opportunities (Ratha, Connel, and Bolle, 2008). Travel Control As a result of numerous reason, there have been an increased requirement to have passengers travelling through airports, in ferries, and even trains to be personally registered (Feng, 2006). Today these identifications checks have been driven mostly by visa regulations, security concerns such as terrorism, and so forth (Hong and Jain, 2008).

And because passenger traffics at the airports and train stations is already increasing each time and has been predicted to increase at an alarming rate, organizations that are directly involved in the control and management of transportation system/infrastructures have been found to be interested in automation and rationalization of their processes and their procedures (Monrose and Rubin, 2005). Financial Authorization In its application in the financial sector, it is known that money in term of coins and notes are being replaced fast virtually (Carlisle, 2009).

In today business environment, this has happened in the form of bank or, pocket electronic money, or credit cards, and so forth. However, in most situations, the physical transaction is not important because money in the financial institutions can be directly connected to rightful owners (Monrose and Rubin, 2005). Spreading of biometric authentication in the financial sector such as in banks have really decreased the need for physical transactions such as the use of credit cards since virtual money transactions usage connect people directly at a click of a mouse (Hong and Jain, 2008).

This has resulted in change in people’s behaviours, in addition, the government have the ability to surveillance on the money movements. In the near future, two possibilities are expected to occur in response to this situation (Feng, 2006). First, people perception on new technology can be against the use of virtual money, or people may try to change the taxes and economic system that allow them to live exclusively on virtual currency system (Fierrez-Aguilar, 2007). The second solution, or development is that virtual money has been predicted to evolve in near future, but it also predicted to be better than before (Carlisle, 2009).

Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us