Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Post: #1

Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics such as finger scan, retina, iris, voice scan, signature scan etc. This method of identification is preferred over traditional
methods involving passwords and PIN numbers for various reasons: the person to be identified is required to be physically present at the point-of-identification; identification based on biometric techniques obviates the need to remember a password or carry a token. With the increased use of computers as vehicles of information technology, it is necessary to restrict access to sensitive/personal data. By replacing PINs, biometric techniques can potentially prevent unauthorized access to or fraudulent use of ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. A biometric system is essentially a pattern recognition system, which makes a personal identification by determining the authenticity of a specific physiological, or behavioral characteristics possessed by the user. An important issue in designing a practical system is to determine how an individual is identified. Depending
on the context, a biometric system can be either a verification (authentication) system or an identification system.

Biometrics is a rapidly evolving technology, which is being widely used in forensics such as criminal identification and prison security, and has the potential to be used in a large range of civilian application areas. Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. It can be used during transactions conducted via telephone and Internet (electronic commerce and electronic banking). In automobiles, biometrics can replace keys with key-less entry devices Biometrics technology allows determination and verification of one's identity through physical characteristics. To put it simply, it turns your body into your password. These characteristics can include face recognition, voice recognition, finger/hand print scan, iris scans and even retina scans. Biometric systems have sensors that pick up a physical characteristic, convert it into a digital pattern and compare it to stored patterns for identification

Identification And Verification Systems
A person?s identity can be resolved in two ways: identification and verification. The former involves identifying a person from all biometric measurements collected in a database and this involves a one-to-many match also referred to as a ?cold search?. ?Do I know who you are?? Is the inherent question this process seeks to answer. Verification involves authenticating a person?s claimed identity from his or her previously enrolled pattern and this involves a one-to-one match. The question it seeks to answer is, ?Are you claim to be??

Verification requires comparing a person?s fingerprint to one that pass previously recorded in the system database. The person claiming an identity provided a fingerprint, typically by placing a finger on an optical scanner. The computer locates the previous fingerprint by looking up the person?s identity. This process is relatively easy because the computer needs to compare two-fingerprint record (although most systems use two fingerprints from each person to provide a safety factor). The verification process is referred as a ?closed search? because the search field is limited. The second question is ?who is this person?? This is the identification function, which is used to prevent duplicate application or enrollment. In this case a newly supplied fingerprint is supplied to all others in the database. A match indicates that the person has already enrolled/applied.

The identification process, also known as an ?open search?, is much more technically demanding. It involves many more comparisons and may require differentiating among several database fingerprints that are similar to the objects.
Post: #2
please read for Bio-metrics and Bio-metrics seminars report

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: what are bio weedicides wikipedia, bio chip transponder, voice quality metrics, metrics, bio weedicides wikipedia, bio chip ganassi, ahar bio cent,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Bio-Molecular Computing computer science crazy 1 1,418 06-02-2012 12:49 PM
Last Post: seminar addict
  Bio-inspired Robotics seminar surveyer 0 1,176 24-01-2011 05:19 PM
Last Post: seminar surveyer
Lightbulb Micro-fabricated Bio-sensors seminar projects crazy 0 2,287 27-01-2009 10:23 AM
Last Post: seminar projects crazy
Lightbulb Nano-Bio (Bio-Nano) Frontier: seminar projects crazy 0 1,546 21-01-2009 12:56 AM
Last Post: seminar projects crazy
  Wearable Bio-Sensors computer science crazy 0 1,287 21-09-2008 10:25 AM
Last Post: computer science crazy