Posted: March 18th, 2023
Biometric may be described as the mechanized way of finding the personality of a living being depending on the person’s behavior and physiology. While examining the description of biometrics, there are various definite provisions that should be explained to thoroughly know about biometric technology. The concept of ‘mechanized way’ refers to three fundamental modes of ascertaining identity by connecting to the biometric equipment. They are (1) the method to scan and obtain a digital or analog picture of the living being’s feature (2) handing out and assessment of the picture with the existing information and (3) checking the details with the application structure. The word ‘living’ being is of utmost importance while describing biometrics. This means the word does not include a latex finger, prosthetic eye, plastered hand or a digital audio record. Biometric equipment records digital and analog picture to find out a live feature in a person. The word living distinguishes biometric from forensic verification though the fundamental techniques surpasses both fields. (Biometrics Technology)
The certification of a person through biometric technology has gained momentum in the recent times due to the emerging needs in e-banking, e-commerce and the increased level of security assessment after the series of terrorist attacks around the world. Identification of the face has received much recognition in comparison to other methods of biometric certification due to its non- invasive and user friendly methods. The limitations of identification of a face include the picture received from an open surrounding, huge postures, etc. This makes identification of a face difficult precisely and steadily. Identification of a person through surveillance is a simple method. A photograph of an individual gives enough data compared to information taken from a drawing. The outline of the face and the organic contours in a face leads to the identification of a person. To get good information from a facial image a closely taken picture is the best. This gives information like posture, expression, background and the brightness of the face. (Li, 50-51)
Face recognition is conducted to understand the objective of a person that may cause possible trouble in various surroundings like an office or a common place. Other than the above gestures, a face can be recognized according to the style of the movement of the head. Face recognition is of importance in both household as well as industrial settings. Burglar bells can be customized with familiar faces, so that it can detect strange faces and keep the details for proof. This technique is of interest for marketing companies to find the nature of customers for a particular product and their behavior while shopping. The right to use various resources in an office and at home like telephone, computer or other equipments can be restricted using face identification technique. (Jain, 217)
Identification of a face should be conducted in an automatic manner from normal circumstance to get a picture of reflex actions of a person. This is against the identification of a face in a security enabled organization where a person stands in front of the detecting machine to prove his identity. The machine should catch the movements of a person in uncontrolled settings and process the information to arrive at conclusions quickly. This is the method of identifying face from video pictures from various angles and movements. The method of processing should be easy for standard processors to give out results quickly. A low priced image catcher is enough for this purpose, though a colored one will be of added advantage. (Jain, 221-222) low accuracy, high rejection method is used to find a lesser number of faces from a huge amount of doubtful information whereas a high accuracy, low rejection method is used to find more number, say, a thousand or a million people using a lesser quality of picture information. In a complex situation the posture and the amount of light on the face reflects on the quality of outcome from the biometric equipment. Another complexity while viewing a huge number of people is their posture like sitting, standing or moving positions. Moreover, the direction towards which a face is moving is another constraint. A low decree of picture will be recorded in the case of one permanent camera. Though this is adequate to capture picture of familiar people, other challenges for an automated identification is the different kind of dressing of a person, make up, ornaments, fashion of hair, scar in the face, age, etc. The automated equipment should be upgraded from time to keep an account of strangers and familiar people who visit the setting under surveillance. A video picture with voice is highly appreciable to register the presence of a person. (Jain, 223-224)
Fingerprints are one of the ancient biometric methods of verifying identity of a person. In the beginning of the 20th century, fingerprints were used as signature to verify a personal legally. The assessment of fingerprints by a person is a difficult method and takes a long time and requires the work of a specialist. Thus mechanized method of fingerprint recognition came up. There are varied forms of information hidden in fingerprints. A detailed morphological analysis of fingerprints indicates that they remain the same from the time of birth till the time of death of a person. Secondly, fingerprint of a person is distinct. Fingerprints are not the same in any two individuals. This is also the case with twins though they have other similar features. The light colored region of a fingerprint is known as ridges and the dark colored region is known as valleys. These are collectively called the Galton characteristics. Ridges in a fingerprint may be describes as one curved portion. A fingerprint is formed by the joining of many ridges. The last part of the ridges and the small figures produced as a result of the passage of ridges is known as minutiae. The features found by Galton are classified into four; the first and last part of the ridges, enclosures, forks and islands. E.R.Henry is another name to reckon with fingerprints. He classified the figure of a fingerprint into various sections so clearly that government agencies use them to identify a person. (Jain, 4-7)
The sections that reveal the identity of a person are Arch (a), Tented Arch (T), Right Loop (R), Whorl (W) and Left Loop (LT). Both Henry’s classification and Galton’s characteristics are used to arrive at a conclusion on the identity of a person through fingerprints. Today mechanized methods are used to match verify the identity of fingerprint using computers. AFAS (Automatic Fingerprint Authentication System) and AFIS (Automatic Fingerprint Identification System) are the two prevalent method of verifying fingerprints. On entering a fingerprint into mechanized equipment, it gives out a set of results and a grade representing the level of identity of the fingerprint with each person verified in the available information. If there is no total identity to a person, the given set of results decreases the space between the targeted person and the fingerprint. Verification of fingerprint was widely used to in the police departments to find criminals. Off late, it is used to restrict admission to various offices and to provide security in financial institutions. Thus fingerprint identification equipments are widely available in the marketplace. (Jain, 8-10)
Identification of a live person from the iris gives precise result. The amount of error from such an identification method is least or nil. This is a new technology in comparison to identification using face or fingerprint. The uniqueness of an iris is studied depending on the color of the ring around the pupil. The iris has nearly two hundred and sixty six unique features which is a good base for a biometric verification. The iris constitutes tissues with elastic connective nature. The trabecular meshwork in an iris separates the iris with features like freckles, furrows, corona, rings and striations. The technology used to identify a person from his iris employs around 173 features to substantiate the identity. (U.S. General Accounting Office (b), 11) the iris remains the same during the entire life of a person unless it undergoes a wound. The nature of an iris is recorded using a high resolution camera to give a black and white picture. The border of the picture is scrutinized to find a match to the given information. The evident regions of the iris are later transformed into a pattern which is used to recognize the person. (U.S. General Accounting Office, 47)
Though the accuracy of identification from iris is almost perfect, the distance between the person and the camera is a vital factor. A lengthy distance from the camera will lead to a change in the resolution and the posture of the eye. The setting under which the picture of the iris is taken is another factor to substantiate the perfection of identity. The angle from which a picture of iris is taken results in a change if the posture is not restricted to a change of less than 30 degrees. If there is a major change in the posture of the iris a three dimensional picture of the iris is required to match the identity. (Kanade; Jain; Ratha, 4, 12)
Retina person can be identified from his retina by evaluating the picture of the blood vessels behind the eyes. These blood vessels are called choroidal vasculature. While taking the picture of the retina using infrared rays, the retina is not clearly seen. But certain equipments catch a glimpse of the visual spectrum that assists the evaluation of the retina. The exclusive model of the blood vessels is the identifying factor in a retina. (Bolle, 53) it is not the same even in the case of twins. (U.S. General Accounting Office (a), 27) EyeDentify equipments used to verify retina can check almost three thousand people. Verification of around 1500 people may be conducted in less than five seconds by this equipment. This equipment however cannot capture the image of individuals who has poor vision or severe astigmation. The person under question should be placed near the equipment to get a good picture. This is a costly method to identify retina in comparison to other method of biometric verification. An important aspect of identification through retina is the permanent condition of the retina unless it undergoes a change due to severe mishap. This is a reliable method because a person cannot fix an artificial retina into the eyes. Besides the use of EyeDentify equipment, recent inventions has lead to capture the retina using electromechanical feeler from a close point to learn about its reflective aspects as well as its absorption features. In this method, the retina is first exposed to a 7mW light which enhances the opportunities to know about the model of the veins. One of the disadvantages of the method is the huge price of the feeler. (Bolle, 53)
Another method used to get a picture of the retina is by passing light through the pupil of the eye. The model of the blood vessels is recorded at 400 spots to create a 96 byte model. Identification of a person through retina is employed in important security settings and government buildings. Biometrics using retina is one of the most difficult methods. Ancient techniques required individuals to look at a circling green light for about ten to twelve seconds at a distance of half an inch from the eyes and remain constant. But latest technology requires a person to stay constant only for about 1.5 seconds and the picture of retina can be capture at a distance of about one meter. This method is not sensitive to cataracts, sun glasses or contact lens. Hence it has an edge over the older method. Retina remains the same throughout life, but may undergo a change if a person undergoes glaucoma, high blood pressure, diabetes or AIDS. Though there are latest techniques to identify retina, certain individuals are reluctant to this method since they are exposed to infrared lights. Some people show reluctance since they feel this test would reveal symptoms of illness. Other than EyeDentify, Retinal Technologies is the enterprise which sells equipment to verify retina. (U.S. General Accounting Office (a), 27)
The identity of a person is cracked down from his voice and speech. The words in a person’s speech are classified into several parts called phonemes. Phonemes are distinguished based on the cadence, inflection and its pitch. The voice of a person is interpreted out of these three aspects which are inherited from family, culture and the place of one’s living. The accent of a person is influenced by his surroundings. The voice of a person has both behavioral as well as physiological relevance for biometric. Hence our voice is related to our body and surroundings. An example is the voice of a child and the voice of an adult. Further a person’s voice modulates according to the surroundings from where he speaks. This makes voice an important aspect to assess security through biometric. A voice can be recorded either through a telephone or through a computer. A voice recorded through microphone fixed to a computer gives a better quality record for interpretation. Necessary deletion of other voice in the surrounding can be done in this method. (Reid, 110-112)
Modern digital cellular techniques can also be applied to record voice. There are four steps to verify a voice to find identity. They are permanent phrase assessment, permanent vocabulary assessment, flexible vocabulary assessment, text independent assessment. In permanent phrase assessment, the phrase is repeatedly interpreted by using the cadence in the phoneme. When a similar wave is found in the model of the interpreting equipment, the identity of the voice is established. Permanent vocabulary assessment is done using the words repetitively used by the person. The words are translated into digits zero through nine. A repetition of the model created by these digits compared to the person results in finding the match. Flexible vocabulary assessment is conducted in a situation where the person uses a set of words in a given setting for verification. Here the words are compared to a combination of phonemes. While testing for verification the person uses these words and then they are evaluated to find identity. In text independent assessment many words are checked for identity. This is judged as a poor method of verifying voice. The best method of verification can be assessed depending on the level of security in a setting and the ease to handle it. (Reid, 114)
Certification of identity using biometric assessment is gaining momentum in offices and common places to ensure security. Besides, security it is the convenience factor that gives importance to biometric. The details of identity are encrypted to stop duplication in various public facilities. Biometric details are entered into equipment and the embedded software verifies for authentication. Thus, factors like face, iris, retina, voice and fingerprints in a human body which cannot be duplicated, forms the basis for biometric verification.
Bolle, Ruud. Guide to Biometrics.
Jain, L.C. Intelligent Biometric Techniques in Fingerprint and Face Recognition. CRC Press.
Kanade, Takeo; Jain, Anil K; Ratha, Nalini Kanta. Audio- and Video-Based Biometric Person
Authentication. Springer, 2005.
Li, Stan Z. Advances in Biometric Person Authentication: 5th Chinese Conference.
N.A. Biometrics Technology. http://et.wcu.edu/aidc/BioWebPages/Biometrics_Technology.html
N.A. What is Biometrics. 10 October, 2006. http://searchsecurity.techtarget.com/sDefinition/0,sid14_gci211666,00.html
Reid, Paul. Biometrics for Network Security.
Prentice Hall PTR. 2003.
U.S. General Accounting Office (a). National preparedness technologies to secure federal buildings. DIANE Publishing. 2002.
U.S. General Accounting Office (b). Technology assessment using biometrics for border security. DIANE Publishing. 2002b.
Zhang, David. Biometric Solutions for Authentication in an E-world.
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!
Place an order in 3 easy steps. Takes less than 5 mins.