twitterfacebookgoogle pluslinkedinrss feedemail

Introduction Biometrics

Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

    Biometric characteristics can be divided in two main classes:
    Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely replaced retina, and odour/scent.

        Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviorists for this class of biometrics. Strictly speaking, voice is also a physiological trait because every person has a different vocal tract, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral.

    In the era of Science and Technology, Biometric Technology is becoming more and more useful with its bunches of applications. Nowadays there are very few areas where biometrics not used. It is useful at shops, schools, offices, organizations, companies and libraries no matter how small or big it is. Biometrics has wide range of applications ranging from visitor management, access control system, biometric door locks, finger print readers and face recognition systems. Biometric fingerprints attendance is one of the most powerful applications of biometric technology. It is widely used at schools, colleges, business firms, shopping malls, companies and organizations. Biometric time attendance systems used to track each and every person coming to your place is actually who he claims to be or not with its time and other details. It uses a fingerprints recognition system to verify a person's identity and record its time-in and time-out with all required details.

    A biometric system can operate in the following two modes

        Verification – A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smart card, username or ID number.

        Identification – A one to many comparisons of the captured biometric against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold

No comments:

Post a Comment

 

Total Pageviews

Live Traffic Feed