All
of these approaches are examples of computational intellect—a field of study that
focuses on computer processes imitating or simulating human intelligence, in submission
to a variety of domains. This book examines the submission of computational astuteness
to one of most self-motivated area of computer based security—Biometrics.
A biometric recognition
system is a habitual
pattern recognition system that recognizes a person by influential the authenticity
of a detailed physiological and/or behavioral attribute (biometric) obsessed by
that person (Yanushkevich, Gavril ova, Wang, & Srinhari, 2007). Physiological
biometric identifiers typically
include fingerprints, hand geometry, ear patterns, eye patterns (iris and
retina), facial appearance and other physical individuality. Behavioral
identifiers are voice,
signature, typing patterns and others. Controlling access to forbidden areas
and defensive imperative national or public well being is one of the main
mandates of security and cleverness services. Regularly, to come to a decision
if a person is allowed to access a proscribed area, a biometric system is used.
But a system based solely on a single source of information may be slowed down
by higher error rates in assessment to the system which relies on more than a
single source of in sequence to make its decision. Moreover, no existing
biometric system even with the most powerful algorithms can provide one hundred precept reliable results, particularly in the attendance of noisy, incorrect,
or forged data.
No comments:
Post a Comment