Monday, 29 July 2013

BIOMETRIC IDENTIFIERS

                                Controlling right of entry to proscribed areas and defending significant government and civilian substance are among st the main actions of national and worldwide security organization. Similarly, with the progression of large-scale networks (e.g., social networks, e-commerce, e-learning) and the growing apprehension for identity theft problems, the design of suitable personal verification systems is becoming more and more important. Usually, person verification for access control to a prohibited area or for recognition in different networks or social services scenarios (e.g., banking, welfare expenditure, immigration policies, etc.) is done using biometric verification
                                          Bio metric verification offers a natural and dependable solution to the problem of establishing identity of a person utilizing his/her physiological or behavioral biometric uniqueness or identifiers. The term “biometry” literally means “life science and listening carefully on studying biometric identifiers. These biometric identifiers, also called biometric traits, are integral part of a person’s individuality. Some of the physiological uniqueness that are now used for biometric acknowledgment include face, fingerprint, hand-geometry, ear, iris, retina, DNA, palm print, hand vein, etc. Voice, gait, signature, keystroke dynamics are examples of behavioral uniqueness used for biometric acknowledgment. Soft biometrics emerged as a new group of biometric in advance more and more concentration. It includes dimensions related to person’s height, race, age, and gender. Finally, we recognize one more group: social biometrics, making its way into the state-of-the-art security systems. This group includes data obtained from observing social performance of the subject, interests, social network associations, work and freedom patterns, hobbies, and communication over social media.

No comments:

Post a Comment