Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Project Report on Biometric Recognition

Category: Earth Sciences Paper Type: Professional Writing Reference: APA Words: 1600

Introduction of Biometric Recognition:

Biometric recognition offers major convenience and security as compared to traditional methods of recognition. In many new and existing technologies, biometric consider a major part of it. Different human traits are used as biometric characteristics to accomplish many requirements which include collectability, permanence, distinctiveness, and universality. We have to consider the issue of circumvention, acceptability, and performance by using a practical biometric system. The biometric recognition system fulfills the requirement of resources, speed, and accuracy according to the system.

A Biometric System is a complete process that recognizes in the system of pattern recognition according to physiological and behavioral characteristics possessed by a person based on the features vectors. Two different modes are used in the operation of the biometric system that includes verification and identification depends on the context of the application. The mode of verification provides the identity of a person that is prestored in the system database and compares the capture biometric characteristics with the biometric template of a person. Through personal identification number, login name smart card and other elements are used for recognition claims in the system. Verification identity is normally used as a positive recognition and prevents multiple people from the same identity formats.

In the mode of identification, by searching the complete template of data for a match the system recognizes a person. To establish an individual identity, the systems conduct a one to many comparisons. The system establishes criteria to identify a person and use this critical component of negative recognition applications and stop a person to use multiple identities because of negative recognition.

Discussion of Biometric Recognition:

Biometric recognition usage increase with time in a different system. These methods are helpful to explain the security and protection of the system in a better way. So here are some tools and techniques that are useful in the biometric system and provide lots of benefits to its users.

Tools and techniques of Biometric Recognition:

 Different tools and techniques include fingerprint recognition, facial recognition, iris recognition, finger vein pattern recognition, and palm vein pattern recognition, voice recognition, and signature recognition.

            Palm vein pattern recognition is a technique that depends on the unique vein pattern of the palm. This is a more secure and simple method of identification as it uses more reference points as compared to other techniques. In the area of biometric security, this is considered the best technique because it cannot copy easily. It offers a high level of user convenience and a fast and accurate system. Based on the plan vein pattern recognition, the access control is system is more expensive as compared to other systems. So because of this, it is used in that sector that demands high security like banking sectors, or any government sector. It is considered more advanced technology and promotes the security in a better way. (Recogtech, 2020)

Finger vein pattern recognition is an effective technique. it captures the bifurcations of veins and ending points in the form of image and digitized and then convert into encrypted code in case of vein pattern recognition. This technology is considered more secure as compare to fingerprint identification as this method combines the fact that veins are beneath found as compare to the surface of the skin and it considers more convenience for the users. This is also a very expensive technology. But this technology face issues to read the cold fingers and dead fingers and face difficulties in the recognition.

Iris recognition technology is one of the best technologies. In this technology, a scanner study the unique characteristics of the iris during the scan and this information converted into the encrypted code. This technique is considered the best security technique if it is used through infrared light for scanning purposes. This technique is very effective but some users feeling not comfortable while this scanning and consider a drawback for the users. This technique also performs its function at some specific speed and a system must be developed that can read the iris of person to some distance. (Harpreet Saini, 2013)

Facial recognition is a very useful and effective technique that commonly used in different areas. It analyses the position and shape of the part of the face to take a proper match with the store data. For security purposes, facial recognition is considered offshoot for the face detection technology that recognizes the image of people. this technology gives more appropriate results and it makes a good deal to scan a crowd for a suspicious individual by allowing the negative identification or exclusion of faces. this technology also creates a problem because it starts after the hairline down. But it still provides sufficient security to different systems.

Fingerprint recognition is the most commonly used technique in organizations. In the line pattern on the surface of the figure, this identification system based on the recognition of fingers that have specific characteristics. The line pattern is saved in the form of the image according to bifurcations, ridge endings, and island. This is the most commonly used techniques and it has some drawbacks that the image can be replicated easily. The image can be copied by using the same code and fingerprints can be spoofed using the relatively accessible technology and this is also not necessary that finger attaches with the body.

Voice recognition technology is used to determine the voice of the users to maintain a high level of security. The characteristics of voice like its frequency, pitch and tone can be recognized in this application. The frequency of voice determines on different focuses that learned speaking habits and the shape of vocal tracts. The whole system is this technique is based on the words that users speak through the microphone and this is attached to the system. The software of the system recognizes the voice and on roughly twenty parameters extracts the significant quantity that includes waveforms, density, energy, speech and pitch, and many others. This whole information is connected with the database where the actual information is stored and then match with the voice. This technique is the most simple and common use in every place and having qualities like cheap, non-intrusive and easy to use.

Signature recognition is considering the least effective biometric technique. The information in the form of text involved is regular and continuously used. On-sensor table user put their signature and the device keep record and match with the database information for verification. This technology is considered a low cost and writing table involve in this technology and competes for the system. In the ability of the biometric to perform at high accuracy levels, this significant technology improves the cost efficiency without suffering any major loss. It requires less training and also high user acceptance because it can easily handle by every user but this technology is upgraded according to time and show less distinctiveness.

Comparison of biometric:

In different applications, many biometric characteristics are used commonly. The choice of biometric depends on the application and each biometric has its strengths and weaknesses. No, any biometric technique is optimal in other words meet all the requirements of applications. depth on the operational mode and properties of the biometric applications, biometric application specify in a matching format. As compare to voice-based technique the figure print and iris-based techniques are more accurate.

But the voice-based technique is more reliable in a telebanking application. Every biometric application is different according to its potential of circumvention, acceptability, performance, collectability, permanence, distinctiveness and barriers to universality. All the features of the biometric applications are useful according to the user’s requirements. Different measurements are used to obtain maximum benefits for the applications of biometric and also provide techniques that are helpful for all the users. (OTTI, 2016)

Application of biometric systems:

The biometric system can be divided into three major groups according to their requirements. Commercial applications, government applications, and forensic applications. Forensic applications include mission children, parenthood determination, terrorist identification, a criminal investigation, and corpse identification. Government applications include welfare-disbursement, passport control, and border control.

Social security, driver’s licenses, correctional facilities, and national ID cards. Commercial applications include distance learning, medical records management, PDAs, cellular phones, physical access control, credit cards, ATMs, internet access, e-commerce, electronic data security, and computer network logins. These applications provide lots of facilities and benefits to all users and also manage the entire security problem in a better way. Because the biometric applications also provide a secure and protective path to manage the security problem of the users and give them a system that provides long term benefit and their data protection securely according to new requirements. (PRABHAKAR, 2003)

Conclusion of Biometric Recognition

In the end, we can conclude that biometric recognition is one of the best technology that provides major privacy and security to its users. This system involves software management that handles all the information record through the application and saves in a database where all the actual and real information also saves. Biometric applications are user friendly and they handle according to human behavior and their characteristics. These applications perform their operation through human interaction and secure the work and information at a high level according to their usage.

 Reference of Biometric Recognition:

Harpreet Saini, K. G. (2013). Comparative Analysis of Various Biometric Techniques for Database                     Security. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064,               150-155.

OTTI, C. (2016). Comparison of biometric identification methods. 254-265.

PRABHAKAR, P. K. (2003). Biometric Recognition. IEEE SECURITY & PRIVACY , 33-42.

Recogtech. (2020). 5 common biometric techniques compared. Retrieved from             https://www.recogtech.com/en/knowledge-base/5-common-biometric-techniques-compared

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Quick N Quality

ONLINE

Quick N Quality

1428 Orders Completed

George M.

ONLINE

George M.

1344 Orders Completed

Study Master

ONLINE

Study Master

1617 Orders Completed