Introduction of Biometric Recognition:
Biometric
recognition offers major convenience and security as compared to traditional
methods of recognition. In many new and existing technologies, biometric
consider a major part of it. Different human traits are used as biometric
characteristics to accomplish many requirements which include collectability,
permanence, distinctiveness, and universality. We have to consider the issue of
circumvention, acceptability, and performance by using a practical biometric
system. The biometric recognition system fulfills the requirement of resources,
speed, and accuracy according to the system.
A
Biometric System is a complete process that recognizes in the system of pattern
recognition according to physiological and behavioral characteristics possessed
by a person based on the features vectors. Two different modes are used in the
operation of the biometric system that includes verification and identification
depends on the context of the application. The mode of verification provides the
identity of a person that is prestored in the system database and compares the
capture biometric characteristics with the biometric template of a person.
Through personal identification number, login name smart card and other
elements are used for recognition claims in the system. Verification identity
is normally used as a positive recognition and prevents multiple people from the
same identity formats.
In
the mode of identification, by searching the complete template of data for a
match the system recognizes a person. To establish an individual identity, the
systems conduct a one to many comparisons. The system establishes criteria to
identify a person and use this critical component of negative recognition
applications and stop a person to use multiple identities because of negative
recognition.
Discussion of Biometric Recognition:
Biometric recognition
usage increase with time in a different system. These methods are helpful to
explain the security and protection of the system in a better way. So here are
some tools and techniques that are useful in the biometric system and provide
lots of benefits to its users.
Tools
and techniques of
Biometric Recognition:
Different tools and techniques include
fingerprint recognition, facial recognition, iris recognition, finger vein
pattern recognition, and palm vein pattern recognition, voice recognition, and
signature recognition.
Palm vein pattern recognition is a technique that depends
on the unique vein pattern of the palm. This is a more secure and simple method
of identification as it uses more reference points as compared to other
techniques. In the area of biometric security, this is considered the best
technique because it cannot copy easily. It offers a high level of user
convenience and a fast and accurate system. Based on the plan vein pattern
recognition, the access control is system is more expensive as compared to
other systems. So because of this, it is used in that sector that demands high
security like banking sectors, or any government sector. It is considered more
advanced technology and promotes the security in a better way. (Recogtech, 2020)
Finger
vein pattern recognition is an effective technique. it captures the
bifurcations of veins and ending points in the form of image and digitized and
then convert into encrypted code in case of vein pattern recognition. This
technology is considered more secure as compare to fingerprint identification
as this method combines the fact that veins are beneath found as compare to the
surface of the skin and it considers more convenience for the users. This is
also a very expensive technology. But this technology face issues to read the
cold fingers and dead fingers and face difficulties in the recognition.
Iris
recognition technology is one of the best technologies. In this technology, a
scanner study the unique characteristics of the iris during the scan and this
information converted into the encrypted code. This technique is considered the
best security technique if it is used through infrared light for scanning
purposes. This technique is very effective but some users feeling not
comfortable while this scanning and consider a drawback for the users. This
technique also performs its function at some specific speed and a system must
be developed that can read the iris of person to some distance. (Harpreet Saini, 2013)
Facial
recognition is a very useful and effective technique that commonly used in
different areas. It analyses the position and shape of the part of the face to
take a proper match with the store data. For security purposes, facial
recognition is considered offshoot for the face detection technology that
recognizes the image of people. this technology gives more appropriate results
and it makes a good deal to scan a crowd for a suspicious individual by
allowing the negative identification or exclusion of faces. this technology
also creates a problem because it starts after the hairline down. But it still
provides sufficient security to different systems.
Fingerprint
recognition is the most commonly used technique in organizations. In the line
pattern on the surface of the figure, this identification system based on the
recognition of fingers that have specific characteristics. The line pattern is
saved in the form of the image according to bifurcations, ridge endings, and
island. This is the most commonly used techniques and it has some drawbacks
that the image can be replicated easily. The image can be copied by using the
same code and fingerprints can be spoofed using the relatively accessible
technology and this is also not necessary that finger attaches with the body.
Voice
recognition technology is used to determine the voice of the users to maintain a
high level of security. The characteristics of voice like its frequency, pitch
and tone can be recognized in this application. The frequency of voice
determines on different focuses that learned speaking habits and the shape of
vocal tracts. The whole system is this technique is based on the words that
users speak through the microphone and this is attached to the system. The
software of the system recognizes the voice and on roughly twenty parameters
extracts the significant quantity that includes waveforms, density, energy,
speech and pitch, and many others. This whole information is connected with the
database where the actual information is stored and then match with the voice.
This technique is the most simple and common use in every place and having
qualities like cheap, non-intrusive and easy to use.
Signature
recognition is considering the least effective biometric technique. The
information in the form of text involved is regular and continuously used. On-sensor
table user put their signature and the device keep record and match with the
database information for verification. This technology is considered a low cost
and writing table involve in this technology and competes for the system. In
the ability of the biometric to perform at high accuracy levels, this
significant technology improves the cost efficiency without suffering any major
loss. It requires less training and also high user acceptance because it can
easily handle by every user but this technology is upgraded according to time
and show less distinctiveness.
Comparison
of biometric:
In
different applications, many biometric characteristics are used commonly. The
choice of biometric depends on the application and each biometric has its
strengths and weaknesses. No, any biometric technique is optimal in other words
meet all the requirements of applications. depth on the operational mode and
properties of the biometric applications, biometric application specify in a matching
format. As compare to voice-based technique the figure print and iris-based
techniques are more accurate.
But
the voice-based technique is more reliable in a telebanking application. Every
biometric application is different according to its potential of circumvention,
acceptability, performance, collectability, permanence, distinctiveness and
barriers to universality. All the features of the biometric applications are
useful according to the user’s requirements. Different measurements are used to
obtain maximum benefits for the applications of biometric and also provide
techniques that are helpful for all the users. (OTTI, 2016)
Application
of biometric systems:
The
biometric system can be divided into three major groups according to their
requirements. Commercial applications, government applications, and forensic applications.
Forensic applications include mission children, parenthood determination,
terrorist identification, a criminal investigation, and corpse identification.
Government applications include welfare-disbursement, passport control, and
border control.
Social
security, driver’s licenses, correctional facilities, and national ID cards.
Commercial applications include distance learning, medical records management,
PDAs, cellular phones, physical access control, credit cards, ATMs, internet
access, e-commerce, electronic data security, and computer network logins.
These applications provide lots of facilities and benefits to all users and
also manage the entire security problem in a better way. Because the biometric
applications also provide a secure and protective path to manage the security
problem of the users and give them a system that provides long term benefit and
their data protection securely according to new requirements. (PRABHAKAR, 2003)
Conclusion
of Biometric Recognition
In
the end, we can conclude that biometric recognition is one of the best
technology that provides major privacy and security to its users. This system
involves software management that handles all the information record through
the application and saves in a database where all the actual and real
information also saves. Biometric applications are user friendly and they
handle according to human behavior and their characteristics. These
applications perform their operation through human interaction and secure the
work and information at a high level according to their usage.
Reference
of Biometric Recognition:
Harpreet
Saini, K. G. (2013). Comparative Analysis of Various Biometric Techniques for
Database Security. International
Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064, 150-155.
OTTI, C. (2016). Comparison of
biometric identification methods. 254-265.
PRABHAKAR, P. K. (2003). Biometric
Recognition. IEEE SECURITY & PRIVACY , 33-42.
Recogtech. (2020). 5 common
biometric techniques compared. Retrieved from https://www.recogtech.com/en/knowledge-base/5-common-biometric-techniques-compared