Biometrics system defines the automatic identification of a person based on his/her physiological or behavioural characteristics such as finger scan, retina, iris, voice scan, signature scan etc. This method of identification preferred over traditional methods involving passwords and PIN numbers for various reasons:
The person to be identified is required to be physically present at the point-of-identification; testimony based on biometric techniques prevents the need to remember a password or carry a token. With the increased use of computers as means of information technology, it is necessary to restrict access to sensitive/personal data.
By replacing PINs, biometric techniques can potentially prevent unauthorised access to or fraudulent use of ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. A biometric system is necessarily a pattern recognition system, which makes a personal identification by determining the authenticity of a specific physiological, or behavioural characteristics controlled by the user. The main issue in designing a practical system is to learn how an individual identified. Depending on the context. Biometric system may be a verification system or an identification system.
Biometrics is a rapidly growing technology, which is being broadly used in forensics such as criminal identification and prison security and has the potential to be used in a massive range of civilian utilisation areas. Biometrics can be used to prevent unauthorised access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. It can handle during transactions conducted via telephone and Internet (electronic commerce and electronic banking). In automobiles, biometrics can replace keys with key-less entry devices
Biometrics technology allows determination and verification of one’s identity through physical characteristics. To put it just, it turns your body into your password. These features can include face recognition, voice recognition, finger/hand print scan, iris scans and even retina scans. Biometric systems have sensors that pick up a physical characteristic, convert it into a digital pattern and compare it to stored models for identification.
Identification And Verification Systems
A person’s identity can be resolved in two ways: identification and verification. The former involves identifying a person from all biometric measurements collected in a database, and this includes a one-to-many match also referred to as a ‘cold search’. “Do I know who you are?” Is the original question this process seeks to answer. Verification involves authenticating a person’s claimed identity from his or her previously enrolled pattern, and this involves a one-to-one match. The question it seeks to answer is, “Are you claim to be?”
Verification requires comparing a person’s fingerprint to one that passes previously recorded in the system database. The person claiming an identity provided a print, typically by placing a finger on an optical scanner. The computer locates the previous fingerprint by looking up the person’s identity. This process is relatively easy because the computer needs to compare two-fingerprint record (although most systems use two prints from each person to provide a safety factor). The verification process is referred as a ‘closed search’ because the search field is limited.
The second question is “who is this person?” It is the identification function, which is used to prevent duplicate application or enrollment. In this case, a newly supplied fingerprint supplied to all others in the database. A match indicates that the person has already enrolled/applied.
The identification process, also known as an ‘open search’, is much more technically demanding. It involves many more comparisons and may require differentiating among several database fingerprints that are similar to the objects.