0% found this document useful (0 votes)
99 views

Biometric Systems 1

A biometric system uses physiological or behavioral characteristics to identify users. It requires enrolling users by capturing a biometric template, such as fingerprints, facial features, voice patterns, or iris scans, which is stored for future identification. Biometrics like fingerprints, iris scans, and facial recognition are now used widely for desktop and laptop access as well as social services verification without needing passwords. Speaker recognition also identifies users based on unique voice acoustic patterns.

Uploaded by

Sonia Omapersaud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views

Biometric Systems 1

A biometric system uses physiological or behavioral characteristics to identify users. It requires enrolling users by capturing a biometric template, such as fingerprints, facial features, voice patterns, or iris scans, which is stored for future identification. Biometrics like fingerprints, iris scans, and facial recognition are now used widely for desktop and laptop access as well as social services verification without needing passwords. Speaker recognition also identifies users based on unique voice acoustic patterns.

Uploaded by

Sonia Omapersaud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

BIOMETRIC SYSTEMS

A biometric system is a pattern recognition system which recognizes a user by determining the
authenticity of a specific physiological or behavioral characteristic possessed by the user.

Several important issues must be considered in designing a practical biometric system. First, a user must
be enrolled in the system so that his biometric template can be captured. This template is securely
stored in a central database or a smart card issued to the user. The template is retrieved when an
individual needs to be identified.

Fingerprints: The patterns of friction ridges and valleys on an individual’s fingertips are unique to that
individuals. Fingerprints are unique for each finger of a person including identical twins. Fingerprints
recognition devices for desktop and laptop access are now widely available from many different vendors
at a low cost. With these devices, users no longer need to type passwords instead, only a touch provides
instant access. Several states check fingerprints for new applicants to social services benefits to ensure
recipients do not fraudulently obtain benefits under fake names.

Face Recognition: The identification of a person by their facial image can be done in a number of
different ways such as by capturing an image of the face using an inexpensive camera. Some facial
recognition systems may require a stationary or posed user in order to capture the image. Major
benefits of facial recognition are that it is non- intrusive, hands- free, and accepted by most users.

Speaker Recognition: Speaker recognition has a history dating back some four decades and uses the
acoustic features of speech that have been found to differ between individuals. These acoustic patterns
reflect both anatomy (e.g., size and shape of the throat and mouth) and learned behavioral patterns
(e.g., voice pitch, speaking style).

Iris Recognition: The recognition method uses the iris of the eye which is the colored area that
surrounds the pupil. Iris patterns are thought unique. The iris patterns are obtained through a video-
based image acquisition system. Current systems can be used even in the presence of eyeglasses and
contact lenses. The technology is not intrusive. It does not require physical contact with a scanner. Iris
recognition has been demonstrated to work with individuals from different ethnic groups and
nationalities.

Hand and finger geometry: These methods of personal authentication are well established. Hand
recognition has been available for over twenty years. To achieve personal authentication, a system may
measure either physical characteristics of the fingers or the hand. These include length, width, thickness
and surface area of the hand.

You might also like