Biometric data is about the physical and behavioral characteristics of each person, and it distinguish each individual depends on his or her character and their vital systems. Biometric system is a way of representing human specific data which are the composition and the structure of their body. Biometric identity represents the data using algorithms and using accurate photos. Biometrics is a type of cryptography where it maintains security and its meaning could be comprehended only by a specialist on the biometric field (Ajay Jangra and Shivi Goel 2013, 44-50) Nicholas in A COMPARATIVE STUDY OF SOME BIOMETRIC SECURITY TECHNOLOGIES comments that “biometrics is used in most systems today for the verification and identification of users” which confirms that biometrics is an important field which deserves focusing and studying. Biometric data was used only for medical treatments and finding therapies, it also has been slightly used for security and privacy
Segmentation Enhanced segmentation for multi-finger capture. IX. CONCLUSION Each biometric has its own pros and cons. Biometric authentication systems have become the standard for access control because of their security, speed competence and ease of use. To judge the acceptance and rejection rates of a biometric in any particular application, one has to consider factors like scalability, user privacy and system security.
Unauthorized access to confidential information many have divesting consequences, not only in national security applications, but also in commerce and industry, main mechanism of protection of confidentiality in information systems are cryptography and access control. Examples of threats to confidentiality are malware, intruders social engineering, insecure networks and poorly administered systems. Discussing confidentiality most important thing us cryptography. In this assignment I would like to deeply discuss about cryptography and it
Information security considered as the procedure of protecting information against unauthorized access, disclosure, disruption, modification, use, or destroyed. In other word information security include defending information whatever the form this data may take. Although each organization employ information security to protect its secret data, but security breaches or identity theft may take place, security breach mean illegal access to defined categories of personal information. In other word it mean illegal access to personal information to use, destroy or amend it (Cate, 2008, p.4). Furthermore, identity theft considered as forgery seeking to use the identifying information of another person without legal authorization or permission.
Au- thentication is the process of verifying the claimed identity of a person. Authentication is a means of defense against intruders. There are of various types like authentication using username with password, using card and using biometric. Most commonly, username with password is used for authentication but Password is easily carked or stolen because of human tendency to make password easy to remember and also note down the password so that there is no need to remember. Cards can be stolen and accessing by anyone.
The captured her own biometric data compared with prestored biometric template that is already stored in database. In such system ,any person who wants to be recognized can claims an identity by a PIN(Personal Identification Number),a smart card, a user name, etc, and the claim is true or not true the system conducts one to one comparison. (e.g., “Does this biometric data belong to particular person who entered in system?”).In verification mode only the authorized people can access the system which has the unique ID. Aim of positive recognition is to protect the multiple people who have the same
Introduction Recognition of any individual is a task to identify people. Human recognition methods such as face, fingerprints, and iris generally require a cooperative subject, physical contact or close proximity. These methods are not able to recognize an individual at a distance therefore recognition using gait is relatively new biometric technique without these disadvantages. Human identification using Gait is method to identify an individual by the way he walk or manner of moving on foot. Gait recognition is a type of biometric recognition and related to the behavioural characteristics of biometric recognition.
From a surveillance perspective, walk pattern biometrics is appealing because of its possibility to be performed at a distance, even surreptitiously. Together with high rate of collectability these are the reasons why the method is preferably employed at human identification rather than authentication. Unlike face recognition, which can be easily affected by low resolution, here a video of reduced quality has been often sufficient. Moreover, gait is difficult to disguise, and by trying to do so the individual will probably appear even more suspicious, while face can easily be altered or hidden. On the other hand, slightly modified conditions may introduce a large appearance change, which may lead to a failure in recognition.
I. INTRODUCTION Face recognition is a biometric approach that employs automated methods to recognize or verify the identity of a living person based on his/her physiological characteristics. In general, a biometric identification system makes use of either behavior patterns (such as voice, hand-writing, or key-stroke pattern) or physiological characteristics (such as an iris pattern, fingerprint, or face) to identify a person. For all other biometric system, we need the active participation of subject. But in the case of face recognition system, we require neither the knowledge nor the cooperation of the subject.
Fingerprint are considered as one of the physiological biomatric system of human 's recognition ,because of their stability and personality .It consists of details in the pattern of the fingerprint surface. It is one of it 's kind which you will never see it 's resemblance.Nowadays,fingerprint plays major rale in biometric security,which provide assurances about the validity of user.Touching and swweeping sensore are used to recognize the ridge on the surface of the fingerprint.However, touchig sensors are commonly used because of it 's accuracy and speed. Biometric is the featuer of physiological and behavioral to recognize the identity of people.Fingerprint are classified as physiological biometric because it is part of the human body.In the other hand ,behavioral biometric is the action that the individual does.Physiological biometric is vary crucial iv nowadays security system, because fingerprint is vary accurate easy to use .However,there are couple of advantage and disadvantage . Advantage for fingerprint: 1-The ridge patten on the fingerprint stays the same thoughout a person 's life (through it may become less pronounced),unless the fingertipn is damaged. 2-It is also highly distinctive even identical twins have somewhat different fingerprints.