Biometrics uses unique physical and behavioral attributes to verify identity. Physiological attributes like fingerprints, retina, and iris are used. Behavioral attributes include voice, signature, and keystroke patterns. Biometric systems are used for security in businesses, buildings, and homes by identifying authorized individuals through their unique attributes. They increase security and monitor employee performance and access. Common biometric technologies include fingerprint, face, voice, signature, hand, iris, and keystroke recognition systems.
2. What is biometric ?
Biometrics is the technology, which uses various
individualistic attributes of a person to verify his or her
identity. Various attributes include fingerprints,
geometrical shapes of hands, retina, and iris in the
eyes and so on. Biometric test offers a full-proof and
highly secure method of verification to avoid security
breech and unauthorized access to critical data and
places.
3. Various Characteristics Involved
The characteristics used by biometrics technology are
divided into two groups - physiological and behavioural.
Physiological characteristics involve face
recognition, handprints and fingerprints, veins in
hands, capillary vessels in eyes and so on.
Behavioural characteristics involve voice
modulations, handwriting and signature style, and
keystroke dynamics.
4. Biometric system
Biometric system is advanced methods to induce
systematization and security at various places like
business organizations, building demanding
sophisticated protection and even the residential
areas. Utilizing specific attributes, these systems can
help maintain the much-deserving security level.
Corporate houses are facilitated by these biometric
systems to assess performance of employees and
increase their calibre.
5. Face Recognition Biometric
System
Faces differ on the basis of individuals belonging to
different cultures, races, genders and geographical
locations. Biometric techniques make use of
distinctive face nodal points and use them for
authentication process. Face images are captured,
even without informing the person and stored in
database for future identification. Banking, law
enforcement and custom department are few
fields utilizing these systems.
6. Fingerprint Analysis Biometric
System
Against the ordinary belief, fingerprints-based
biometric analysis store only specific features, like
ridge endings and bifurcations, of fingers in digital
form, instead of capturing exact finger image.
Electronic commerce, law enforcement, computer
and laptop access are few fields, where these
biometrics systems are finding applications. Also,
biometric clocks in offices are based on fingerprint
analysis to keep an eye on employee presence.
7. Voice Recognition Biometric
System
On the basis of throat and mouth shapes and
sizes, voice recognition biometric techniques
are becoming popular with business and
other organizations for carrying our biometric
analysis. The voiceprints act as passwords for
individuals to authenticate their entry to
various places. Special care is taken to
handle the modifications in voice textures
and interference of other voices from
surroundings.
8. Signature Verification Biometric
System
Styles of signing the names differ from an
individual to another. Formation of words,
angles of signing and speed and pressure
employed are few factors, which can form
the basis of admirable biometric tools.
Banks, e-commerce and other fields
requiring signature verifications use these
systems.
9. Other Biometric Systems in the
Market
Hand geometry recognition based biometric tools
make use of dimensions, surface area and shape
of hands and are used for residential as well as
commercial purposes.
Algorithms and 2D and 3D imaging facilitate iris
recognition systems to use the structure and
patterns of eye vessels as identification tools.
Vein structures at the back of hand also form the
basis for biometric systems.
Keystroke dynamics, involving speed of typing and
pressing various keys, are among other useful
biometric techniques.