Biometrics is the use of a person’s unique physiological, behavioral, and morphological characteristic to provide positive personal identification. Traditionally the use of biometric devices has improved our ability to provide authenticated access to physical installations. Biometric systems that are currently available today examine fingerprints, handprints, iris and retina patterns, and face. Systems that are close to biometrics but are not classified as such are behavioral systems such as voice, signature and keystroke systems. They test patterns of behavior not parts of the body. Over the next few years, the use of biometrics will continue to grow and become much more commonplace.
Today the core technologies have evolved and the cost of the equipment is going down dramatically due to the integration and increasing processing power. Certain applications of biometric identification technology are now cost-effective, reliable and highly accurate. As a result, there is no technological or financial barrier for stepping from the pilot projects to widespread deployment. This paper is an attempt to highlights the biometric technologies in concern with human interface.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- PROBLEM STATEMENT
- AIM OF THE PROJECT
- OBJECTIVE OF THE PROJECT
- PURPOSE OF THE PROJECT
- ADVANTAGES OF BIOMETRIC AUTHENTICATION
- DISADVANTAGES OF BIOMETRIC AUTHENTICATION
- RESEARCH QUESTIONS
CHAPTER TWO
LITERATURE REVIEW
- OVERVIEW OF THE STUDY
- REVIEW OF BIOMETRIC FUNCTIONALITY
- HISTORICAL BACKGROUND OF BIOMETRIC
- ISSUES AND CONCERNS OF BIOMETRICS
CHAPTER THREE
3.0 CONSTRUCTION METHODOLOGY
3.1 GENERAL BIOMETRIC BLOCK DIAGRAM
3.2 WORKING PRINCIPLE OF BIOMETRICS
3.3 DIFFERENCE BETWEEN IDENTIFICATION AND VERIFICATION
3.4 DIFFERENCE BETWEEN PHYSIOLOGICAL AND BEHAVIORAL
3.5 BIOMETRIC TECHNOLOGIES
3.6 COMMON BIOMETRIC FEATURES USED FOR AUTHENTICATION
CHAPTER FOUR
- BIOMETRIC TESTING
- PERFORMANCE METRICS FOR BIOMETRIC SYSTEMS
- AREA OF BIOMETRIC APPLICATIONS
CHAPTER FIVE
- CONCLUSION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. This identification method is preferred over traditional methods involving passwords and personal identification numbers (PINs) for several reasons, including the person to be identified is required to be physically present at the point of identification and/or identification based on biometric techniques obviates the need to remember a password or carry a token. With the increased use of computers as vehicles of information technology, restricting access to sensitive/personal data is necessary. By replacing PINs, biometric techniques can potentially prevent unauthorized access to or fraudulent use of the following:
- ATMs
- Cellular phones
- Smart cards
- Desktop PCs
- Workstations
- Computer networks
PINs and passwords may be forgotten and token-based identification methods such as passports and driver’s licenses may be forged, stolen, or lost. Thus, biometric systems of identification are enjoying a new interest. Various types of biometric systems are being used for real-time identification.
The most popular are based on face recognition and fingerprint matching; however, other biometric systems use iris and retinal scans, speech, facial feature comparisons and facial thermograms, and hand geometry. [2] [10]
1.1 AIM OF THE STUDY
The main aim of this work is to highlight and discuss different types of biometric based on their function, operation, characteristic and their security accuracy level.
1.2 OBJECTIVE OF THE STUDY
At the end of this work student involved shall be able to list, learn and understand different types of biometrics based on their function, operation, characteristic and their security accuracy level.
1.3 PURPOSE OF THE STUDY
The purpose of carrying out this study is to expose the ready on the most accuracy and economical type of biometric to use.
1.4 STATEMENT OF PROBELM
Because of the insecurity and lives and property we notice everyday in our society, that an intruder can easily get access to someone house and went away with their property when no one is watching or live traiten agents can easily enter someone house and kill the owner of the house. Even in our public places we also discover that malpractices is everywhere such as in our politics today. There are a lot of malpractice such as in voters registration, when voters will go ahead and register more once in other for him or her to have the ability to vote more than once in the same of different polling unit. We see insecurity of lives and properties and malpractices everyday of our lives. However the invention of biometric is to secure lives and properties and to reduce crime and corruption.
1.5 ADVANTAGES OF BIOMETRICS
- Biometric traits cannot be lost or forgotten (while passwords can).
- Biometric traits are difficult to copy, share and distribute (passwords can be announced in crackers‟ websites).
- They require the person being authenticated to be present at the time and point of authentication. [1]
1.6 DISADVANTAGES OF BIOMETRIC AUTHENTICATION
A biometric authentication system seems to be an excellent solution to authentication problems; however biometric authentication has some weaknesses:
- Education required: While an increasing number of available technologies are “plug and play”, they still require some user education. Users need to know how to position their finger, face, and To be clearly read. Additionally, implementers will need training on proper installation and maintenance of biometric systems.
- Expensive: While there are several models of fingerprint, voice, and signature verification available in the higher range, a majority of technologies are still closer to the $500 mark. Unless biometrics can get below the cost of password administration costs, business will get below the cost of password administration costs, business will not chose to
- Affected by environment and disease: It is not the case that your fingerprints, face, or voice remain constant from day to day, small fluctuations (cold or moist hands for fingerprint scanners, different ambient lighting for face recognition, and background noise for voice authentication) can block the devices. Setting the sensitivity lower makes the product more forgiving but increases the odds of a false positive a faker logging on as someone else. Higher sensitivity means greater security, but it also means that an authorized user may be erroneously
- Harmful: The method of obtaining a retinal scan is personally invasive – a laser light (or other coherent light source) must be directed through the cornea of the eye and uses an infrared light source to highlight the biometric pattern. This can harm an individual’s eye. [2]
1.7 RESEARCH QUESTIONS
At the end of this study, students involved shall be able to answer the following question that is related to this work:
- What are examples of biometrics?
- What is biometric issue?
- What is biometric process?
- What is a biometric census?
- What is the purpose of biometrics?
- Why do we use biometrics?
- What are the benefits of biometrics?
Which of these are examples biometrics?
A Comparative Analysis Of Biometric Classification Technique. (n.d.). UniTopics. https://www.unitopics.com/project/material/a-comparative-analysis-of-biometric-classification-technique/
“A Comparative Analysis Of Biometric Classification Technique.” UniTopics, https://www.unitopics.com/project/material/a-comparative-analysis-of-biometric-classification-technique/. Accessed 22 November 2024.
“A Comparative Analysis Of Biometric Classification Technique.” UniTopics, Accessed November 22, 2024. https://www.unitopics.com/project/material/a-comparative-analysis-of-biometric-classification-technique/
Here’s a typical structure for A Comparative Analysis Of Biometric Classification Technique research projects:
- The title page of A Comparative Analysis Of Biometric Classification Technique should include the project title, your name, institution, and date.
- The abstract of A Comparative Analysis Of Biometric Classification Technique should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of A Comparative Analysis Of Biometric Classification Technique should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to A Comparative Analysis Of Biometric Classification Technique, identifying gaps the study aims to fill.
- The methodology section of A Comparative Analysis Of Biometric Classification Technique should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the A Comparative Analysis Of Biometric Classification Technique research study using tables, charts, and graphs to illustrate key points.
- Interpret A Comparative Analysis Of Biometric Classification Technique results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the A Comparative Analysis Of Biometric Classification Technique study and restate its significance.
- List all the sources you cited in A Comparative Analysis Of Biometric Classification Technique project, following a specific citation style (e.g., APA, MLA, Chicago).