Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
MATCHACCESS
INDIVIDUA
L
BIOMETRI
C
FEATUR
E
CONVERSIO
N
IN
MACHINE
LANGUAGE
COMPARISIO
N
ELSEDENIED
STORED
DATA
BASE OF
PEOPLE
AUTHENTICATION PROCESS:
Keystroke Recognition
Finger print method
Optical Recognition
Signature Recognition
Voice Recognition
Facial Recognition
OPTICAL RECONGINATION
FACIAL RECOGNITION
Facial biometrics can function from either short distances
or over greater distances. Reasonable controlled indoor
lighting, the current state of the art in face recognition is
90 % verification at a 1% false accept rate.
In this recognition process at least three images of each
person. The images are of good quality and were gathered
in a consistent manner in a background that is universally
uniform. Difference of three years in the images stored in
the database. Data set is composed of a heterogeneous set
of still images and video sequences of subjects in a Variety
of poses, activities and illumination conditions.
Facial recognition system calls the attention of the
researcher on the following points.
1.
Watch list performance decreases as a function of
size performance using smaller watch lists is better than
performance using larger watch lists.
2.
since characteristics such as age and sex can
significantly affect performance.
3.
Changes in lighting can also increase the error rate in
these devices.
VOICE RECOGNITION
There are several distinct advantages that voice
recognition has for use in encryption technology. Not only
are voice biometrics perfect for telecommunication
applications, most of the modern personal computers
already possess the necessary hardware to utilize the
applications. Even if they don't, sound cards can be
purchased for as little as $50 and condenser microphones
can be purchased for as little as $10. Therefore, for less
than $100 individuals can possess the technology needed
to have fairly reliable biometric encryption technology for
use over the Internet. This system embeds command
recognition technology into software you developed
according to your imagination. The error rate for this type
of technology ranges between two and five percent but is
more efficient than PIN.
Some drawbacks to this technology are that voiceprints
can vary over the course of the day, and ones health, such
as a cold or laryngitis, can affect verification of the user by
the system.
SIGNATURE RECOGNITION
Signing documents is something that most every adult is
familiar with. In the business world we sign things such as
expense accounts and other official documents. This lends
itself well for signature recognition to be used as a means
of biometric verification in electronic commerce. This
type of signature identification is different however from
the normal two-dimensional signature that one would find
on a form or document. Biometric signature recognition
operates in a three-dimensional environment where, not
only is the height and width of pen strokes measured, but
also the amount of pressure applied in the pen stroke to
measure the depth that would occur as if the stroke was
made in the air. This helps to reduce the risk of forgery
that can occur in two-dimensional signatures.
One drawback to this form of encryption is that people do
not always sign documents in exactly the same manner.
The angle at which they sign may be different due to
seating position or due to hand placement on the writing
surface. Therefore, even though it is three-dimensional
which adds to its ability to discern impostors, it is not as
accurate as other forms of biometric verification.
These types of systems are not as expensive as some of the
higher end systems such as iris scanners, and they are
KEYSTROKE RECOGNITION
Keystroke
biometrics provides a foolproof
authentication solution. Authentication using the typing
rhythm of the user on a keyboard or a keypad takes
advantage of the fact that each user would have a unique
manner of typing the keys. It uses the inter-stroke gap that
exists between consecutive characters of the user
identification code.
When a user types his authentication code, there exist any
abrupt change in this rhythmic manner, and this
uniqueness can be used as an additional security
constraint. As the user logs onto the system for the first
time, a database entry is created for the user and he is put
through a training period, which consists of 15-20
iterations.
This calculates the mean and standard
deviation of the above code. The system has to incur the
additional overhead of maintaining the database, which
would contain all the users information. The inter stoke
interval between the keys is measured in milliseconds.
The systems delay routine can be used to serve the
purpose. The delay routine measures in milliseconds and
the amount of delay incurred between successive strokes
can be used as a counter to record this time interval. Once
the database entry has been allotted for the user, this can
be used in all further references to the user. The next time
the user tries to login, one would obtain the entered interstroke timing along with password. A combination of both
these matrix is used a security check of the user.
This is most likely one of the least secure of the new
biometric technologies that has evolved in recent years;
however, it is also probably one of the cheapest and easiest
to implement.
The disadvantage of this type of recognition is that if the
user looses his rhythm abruptly, he will not be able to
access the system.
SENSORS
USED
RECOGNITION:
FOR
BIOMETRIC
Sensor
Capacitive, optic,
thermal, acoustic,
pressure, sensitive
tablet
camera
microphone
camera
keyboard
USES OF BIOINFORMATICS:
The area of application of these is very vast and in each
and every place where security is of prime importance.
The following are a few of them:
2.
Building
4. Vault and
6.
8.
10. Point-of-
12.
Cellular
CONCLUSION:
Biometrics now a days is growing as a fast adopting
recognition technique as it needs no artificial
authentication rather needs live authentications, which
truly impeccable. The field of application is really going to
increase, no doubt about it.
REFERENCES:
1. Electronics for you (Jan 2004).
2.
www.veridi.com