- signature dynamics
- Typing patterns
- Eye scans
- face recognition
- voice identification
- fingerprint verification
There are many different methods of authentication in a biometric system but these two have more importance as signature dynamics mainly based on the concept of signature identification through signature images but sometimes it also gives wrong report because of different situations and different writing speed. This is mainly applicable to banking applications or highly confidential documents. (htt) Typing patterns is somehow similar to the signature dynamics but a change in a context of keyboard writing as it done on a keyboard the and secure through password and test by speed and patterns. Eye scans include actually iris recognition as well as retina recognition.This technique is inconvenient and more expensive as compared to other methods. Most users are not comfortable with this method and feel uneasy.Iris is the region of the bounded eye with pupil and sclera and the biometric system use a high quality camera to take the scan of iris and avoid to cause any damage as it emits infrared light which is may harmful when using inefficiently. Face recognition method is quite convenient and helpful. It works in recognizing facial features may include lining outside of eye sockets, nose structure and the cheeks lining with side areas of the mouth. Voice identification is basically designed to understand the voice patterns and it's not affected by what is said but only the voice notes.Voice features basically based on the nasal cavities and vocal tracts as well as mouth. Fingerprint verification based on the little physical space and fingerprints are unique and easily accessible. Fingerprints made of valleys and ridges marks and these marks are extracted by the fingerprint verification system for the comparison of marks.
SECURITY IMPLICATIONS IN BIOMETRIC IMPLEMENTATION:
biometric implementations are highly susceptible to security risks in any validation process. As the biometric system is embodied with unique functions so, its necessary that government should take notice of strategic values of the system. (Harinda)Sometimes government commitments are beyond the security steps of biometric implementations like in some countries government allowed stakeholders of big industries to verify the data of there customers from government biometric database before allowing any other services. Biometric implementations come up with many security risks and imposed big responsibility to handle the individual information. The main thing is that the system is quite efficient but the technology concern with unwanted privacy. Some of the experts alarm that sometimes biometric information shows the way to break of freedom of any person and the basic rights of an individual. Once there is all biometric information of an individual than the person has increased significant concerns. different privacy threats contain the utilization of biometrics for any person verification.
No comments:
Post a Comment