Abstract
Biometric measures of one kind or another have been used to identify people since ancient times, with h andwritten signatures, facial features, and fingerprints being the traditional methods. Of late, Systems have been built that auto mate the task of recognition, using these methods and newer ones, su ch as hand geometry, voiceprints and iris patterns. These syst ems have different strengths and weaknesses. This work is a two-sectio n composition. In the starting section, we present an analytical and comparative study of common biometric techniques. The performance of each of them has been viewed and then tabularized as a result. T he latter section involves the actual implementation of the technique s under consideration that has been done using a state of t he art tool called, MATLAB. This tool aids to effectively portray the c orresponding results and effects. voice). Biometrics allows us to confirm or establis h an individual's identity based on who he/she is, rathe r than by what he/she possesses as from ID card or what she k nows for example password (cryptal or non-cryptal) (7)-(10). In much simpler way Biometrics refers to the automatic iden tification of a living person based on physiological or behavi oral characteristics. There are many types of biometric technologies on the market: face-recognition, finge rprint recognition, finger geometry, hand geometry, iris r ecognition, vein recognition, voice and signature. The method o f biometric identification is preferred over traditional method s involving passwords and PIN numbers for various reasons: The person to be identified is required to be physically prese nt at the point-of-identification or the identification based on biometric techniques obviates the need to remember a password or carry a token or a smartcard. With the rapid increase in use of PINs and passwords occurring as a result of the informat ion technology revolution, it is necessary to restrict access to sensitive/personal data. By replacing PINs and pass words, biometric techniques are more convenient in relatio n to the user and can potentially prevent unauthorized acces s to or fraudulent use of ATMs, Time & Attendance Systems, cellular phones, smart cards, desktop PCs, Workstations, and computer networks. PINs and passwords may be forgotten, and token based methods of identification like passports, dri ver's licenses and insurance cards may be forgotten, stolen, or lo st. Various types of biometric systems are being used for real- time identification; the most popular are based on face recognition and fingerprint matching. However, there are other biometric systems that utilize iris and retinal scan, speech, face, and hand geometry.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Zenodo (CERN European Organization for Nuclear Research)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.