Controlling right
of entry to proscribed areas and defending significant government and civilian substance
are among st the main actions of national and worldwide security organization.
Similarly, with the progression of large-scale networks (e.g., social networks,
e-commerce, e-learning) and the growing apprehension for identity theft
problems, the design of suitable personal verification systems is becoming more
and more important. Usually, person verification for access control to a
prohibited area or for recognition in different networks or social services
scenarios (e.g., banking, welfare expenditure, immigration policies, etc.) is
done using biometric verification
Bio metric verification offers a natural and dependable solution to
the problem of establishing identity of a person utilizing his/her
physiological or behavioral biometric uniqueness or identifiers. The term
“biometry” literally means “life science and listening carefully on studying
biometric identifiers. These biometric identifiers, also called biometric
traits, are integral part of a person’s individuality. Some of the physiological uniqueness that are now used for
biometric acknowledgment include face, fingerprint, hand-geometry, ear, iris,
retina, DNA, palm print, hand vein, etc. Voice, gait, signature, keystroke
dynamics are examples of behavioral uniqueness
used for biometric acknowledgment. Soft biometrics emerged as a new group of biometric in
advance more and more concentration. It includes dimensions related to person’s
height, race, age, and gender. Finally, we recognize one more group: social biometrics, making its way into the
state-of-the-art security systems. This group includes data obtained from
observing social performance of the subject, interests, social network associations,
work and freedom patterns, hobbies, and communication over social media.
No comments:
Post a Comment