-
Essay / Comparison of forms of biometric identification
I. IntroductionBiometric identification is the determination of a person's identity through the recognition of a unique characteristic. There are many popular methods of biometric identification and they are rapidly being applied to IT security: Access to a system can be limited to those with a biometric match to an authorized user listed on the system. Facial features, fingerprints, hand geometry, retinal patterns, iris, signature, and voice are all possible candidates for biometric identification because these features are unique from person to person. other. However, all of these methods have specific advantages and disadvantages. Since biometric identification is expensive to implement and the accuracy and effectiveness of user identification is critical to protecting a system, measuring the right characteristic is essential. In this article, different forms of biometric identification are discussed and evaluated to determine which form is best to implement.II. BackgroundFor a biometric system to function properly, each authorized user must first be registered in the system. This is done when a suitable device detects the necessary data from the user. The system extracts the desired information from the input and stores it as a set of numbers, called the user's model. Implementation can be done in two ways. In a single run, a unique number is associated with each template and a user enters their number along with biometric information. In this case, the system only needs to compare the biometric entry to the template associated with that number. Alternatively, the system can remove the number and compare a user's input with each pattern in the system, looking for a match. In the middle of a sheet......13] "Retina Biometrics." Biometric systems and solutions. Internet. September 11, 2011. [14] “Retinal biometry”. 360 Biometrics. Internet. September 11, 2011. [15] “Iris recognition.” National Science and Technology Council. Internet. September 11, 2011. .[16]“Biometric signature recognition”. Technology Executives Club. Internet. September 11, 2011. [17] “Voice verification.” Global security. Internet. September 11, 2011. [18] “Speaker recognition”. Biometrics. National Science and Technology Council. Internet. September 11. 2011. .