Topic > Comparison of forms of biometric identification

I. IntroductionBiometric identification is the determination of a person's identity by recognizing some unique characteristics. There are many popular methods of biometric identification, and they are rapidly being applied to cybersecurity: Access to a system can be limited to those who have a biometric match with an authorized user listed in the system. Facial features, fingerprints, hand geometry, retinal patterns, iris, signature, and voice are all possible candidates for biometric identification, as these features are unique from person to person. However, all of these methods have specific advantages and disadvantages. Since implementing biometric identification is not cheap, and accuracy and effectiveness in identifying users is vital to protecting a system, measuring the right characteristic is critical. In this paper, various forms of biometric identification are discussed and evaluated to determine which form is best to implement.II. ContextFor a biometric system to function properly, each authorized user must first be registered in the system. This happens when an appropriate device detects the data requested by the user. The system extracts the desired information from the input and stores it as a set of numbers, called the user model. The implementation can be done in two ways. In one run, each template is associated with a unique number and a user enters their number along with biometric information. In this case, the system only needs to compare the biometric input with the template linked to that number. Alternatively, the system can eliminate the number and compare a user's input against every pattern in the system, looking for a match. In a...... middle of paper......13] "Retina Biometrics." Biometric systems and solutions. Network. 11 September 2011. .[14] "Retinal biometry". 360 Biometrics. Network. 11 September 2011. .[15] "Iris recognition". National Council of Science and Technology. Network. 11 September 2011. .[16]"Biometric signature recognition". Technology Executives Club. Network. 11 September 2011. .[17] "Voice Verification". Global security. Network. 11 September 2011. .[18] "Recognition of the speaker". Biometrics. National Council of Science and Technology. Network. September 11. 2011. .