Comparative Analysis Of Biometric Classification Technique

Biometrics is the use of a person’s unique physiological, behavioral, and morphological characteristic to provide positive personal identification. Traditionally the use of biometric devices has improved our ability to provide authenticated access to physical installations. Biometric systems that are currently available today examine fingerprints, handprints, iris and retina patterns, and face. Systems that are close to biometrics but are not classified as such are behavioral systems such as voice, signature and keystroke systems. They test patterns of behavior not parts of the body. Over the next few years, the use of biometrics will continue to grow and become much more commonplace.

Today the core technologies have evolved and the cost of the equipment is going down dramatically due to the integration and increasing processing power. Certain applications of biometric identification technology are now cost-effective, reliable and highly accurate. As a result, there is no technological or financial barrier for stepping from the pilot projects to widespread deployment. This paper is an attempt to highlights the biometric technologies in concern with human interface.

TABLE OF CONTENTS

COVER PAGE

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

CHAPTER ONE

1.0      INTRODUCTION

1.1      BACKGROUND OF THE PROJECT

  • PROBLEM STATEMENT
  • AIM OF THE PROJECT
  • OBJECTIVE OF THE PROJECT
  • PURPOSE OF THE PROJECT
  • ADVANTAGES OF BIOMETRIC AUTHENTICATION
  • DISADVANTAGES OF BIOMETRIC AUTHENTICATION
  • RESEARCH QUESTIONS

CHAPTER TWO

LITERATURE REVIEW

  • OVERVIEW OF THE STUDY
  • REVIEW OF BIOMETRIC FUNCTIONALITY
  • HISTORICAL BACKGROUND OF BIOMETRIC
  • ISSUES AND CONCERNS OF BIOMETRICS

CHAPTER THREE

3.0     CONSTRUCTION METHODOLOGY

3.1      GENERAL BIOMETRIC BLOCK DIAGRAM

3.2     WORKING PRINCIPLE OF BIOMETRICS

3.3      DIFFERENCE BETWEEN IDENTIFICATION AND VERIFICATION

3.4 DIFFERENCE BETWEEN PHYSIOLOGICAL AND BEHAVIORAL

3.5 BIOMETRIC TECHNOLOGIES

3.6   COMMON BIOMETRIC FEATURES USED FOR AUTHENTICATION

CHAPTER FOUR

  • BIOMETRIC TESTING
  • PERFORMANCE METRICS FOR BIOMETRIC SYSTEMS
  • AREA OF BIOMETRIC APPLICATIONS

CHAPTER FIVE

  • CONCLUSION
  • REFERENCES

CHAPTER ONE

1.0                                                        INTRODUCTION

1.1                                           BACKGROUND OF THE STUDY

Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. This identification method is preferred over traditional methods involving passwords and personal identification numbers (PINs) for several reasons, including the person to be identified is required to be physically present at the point of identification and/or identification based on biometric techniques obviates the need to remember a password or carry a token. With the increased use of computers as vehicles of information technology, restricting access to sensitive/personal data is necessary. By replacing PINs, biometric techniques can potentially prevent unauthorized access to or fraudulent use of the following:

  1. ATMs
  2. Cellular phones
  3. Smart cards
  4. Desktop PCs
  5. Workstations
  6. Computer networks

PINs and passwords may be forgotten and token-based identification methods such as passports and driver’s licenses may be forged, stolen, or lost. Thus, biometric systems of identification are enjoying a new interest. Various types of biometric systems are being used for real-time identification.

The most popular are based on face recognition and fingerprint matching; however, other biometric systems use iris and retinal scans, speech, facial feature comparisons and facial thermograms, and hand geometry. [2] [10]

1.1                                      AIM OF THE STUDY

The main aim of this work is to highlight and discuss different types of biometric based on their function, operation, characteristic and their security accuracy level.

1.2                              OBJECTIVE OF THE STUDY

At the end of this work student involved shall be able to list, learn and understand different types of biometrics based on their function, operation, characteristic and their security accuracy level.

1.3                                 PURPOSE OF THE STUDY

The purpose of carrying out this study is to expose the ready on the most accuracy and economical type of biometric to use.

1.4                               STATEMENT OF PROBELM

Because of the insecurity and lives and property we notice everyday in our society, that an intruder can easily get access to someone house and went away with their property when no one is watching or live traiten agents can easily enter someone house and kill the owner of the house. Even in our public places we also discover that malpractices is everywhere such as in our politics today. There are a lot of malpractice such as in voters registration, when voters will go ahead and register more once in other for him or her to have the ability to vote more than once in the same of different polling unit. We see insecurity of lives and properties and malpractices everyday of our lives. However the invention of biometric is to secure lives and properties and to reduce crime and corruption.

1.5                            ADVANTAGES OF BIOMETRICS

  1. Biometric traits cannot be lost or forgotten (while passwords can).
  2. Biometric traits are difficult to copy, share and distribute (passwords can be announced in crackers‟ websites).
  3. They require the person being authenticated to be present at the time and point of authentication. [1]

1.6       DISADVANTAGES OF BIOMETRIC AUTHENTICATION

A biometric authentication system seems to be an excellent solution to authentication problems; however biometric authentication has some weaknesses:

 

  1. Education required:While an increasing number of available technologies are “plug and play”, they still require some user education. Users need to know how to position their finger, face, and To be clearly read. Additionally, implementers will need training on proper installation and maintenance of biometric systems.
  2. Expensive:While there are several models of fingerprint, voice, and signature verification available in the higher range, a majority of technologies are still closer to the $500 mark. Unless biometrics can get below the cost of password administration costs, business will get below the cost of password administration costs, business will not chose to
  • Affected by environment and disease:It is not the case that your fingerprints, face, or voice remain constant from day to day, small fluctuations (cold or moist hands for fingerprint scanners, different ambient lighting for face recognition, and background noise for voice authentication) can block the devices. Setting the sensitivity lower makes the product more forgiving but increases the odds of a false positive a faker logging on as someone else. Higher sensitivity means greater security, but it also means that an authorized user may be erroneously
  1. Harmful:The method of obtaining a retinal scan is personally invasive – a laser light (or other coherent light source) must be directed through the cornea of the eye and uses an infrared light source to highlight the biometric pattern. This can harm an individual’s eye. [2]

1.7                                  RESEARCH QUESTIONS

At the end of this study, students involved shall be able to answer the following question that is related to this work:

  1. What are examples of biometrics?
  2. What is biometric issue?
  • What is biometric process?
  1. What is a biometric census?
  2. What is the purpose of biometrics?
  3. Why do we use biometrics?
  • What are the benefits of biometrics?

Which of these are examples biometrics?

2.0 INTRODUCTION:

This chapter provides the background and context of the research problems, reviews the existing literature on the Comparative Analysis Of Biometric Classification Technique, and acknowledges the contributions of scholars who have previously conducted similar research [REV2539] …

Document Information

  • Format: DOC/PDF
  • Title: Comparative Analysis Of Biometric Classification Technique:

YOU MAY LOVE THESE (Recommended)

Posted under:

To start a project on Make Or Buy Decision An Important Purchasing Tool And A Cost Control Technique In An Organization, follow these guidelines: The Role of suppliers function in the public sector is a topic in the filed of purchasing in chapter one it highlights the general over view of the study. Chapter two, it highlights a brief historical background of the topic under study. Chapter three, was how the data is being collected, it high…

93 Pages 1 - 5 Chapters 9,795 Words DOC/PDF Format Instant Download UPN1041

Understand how to write the “Examination Verification System Using Biometric” Project

Posted under:

To develop a project on Examination Verification System Using Biometric, follow these approaches: My research Project is to develop fingerprint biometrics systems that assist in the elimination of examination impersonation. Up till now, the WAEC examination board (WAEC) is not using fingerprint as mode of identification, this has resulted in people sitting for WAEC examinations for others who…

81 Pages 1 - 5 Chapters 17,903 Words DOC/PDF Format Instant Download UPN2335

Posted under:

To undertake a project on Evaluation Of The Application Of Negotiation Technique In The Public Sector Organization, follow these effective ways: Any organization that wishes to make profit at the long run must critically examine her strength and ability to Negotiate Negotiation is one of the most important task of purchasing professionals. It is also the most delicate and difficult because it involves dealing with a seller whose primary a…

78 Pages 1 - 5 Chapters 9,619 Words DOC/PDF Format Instant Download UPN972

To write a project on Evaluation Of Cost Reduction Technique In Achieving Profitability In An Inflated Economy, follow these structure: The research work aim to study the evaluation of cost reduction techniques is achieving profitability in an inflated economy with particular reference to Nigerian Breweries Plc and to find out how effective, the resources of Nigerian Breweries Plc are utilized to improve profitability. This resea…

122 Pages 1 - 5 Chapters 11,619 Words DOC/PDF Format Instant Download UPN65

48 Pages 1 - 5 Chapters 13,971 Words DOC/PDF Format Instant Download UPN26863

Posted under:
Biochemistry (206) and Chemistry (227)
Introduction 1.1 Background of Study 1.1.1 Corrosion Corrosion is defined as a natural process, which converts refined metal to their more stable oxide. It is the gradual destruction or degradation of materials (usually metals) by chemical reaction with their environment which are most likely inevitable. Corrosion is a natural and costly process of destruction like earthquakes, tornados, floods and vocanic eruptions, with one major […]
Live Chat