0% found this document useful (0 votes)
30 views1 page

Bio Metrics

Biometrics uses biological traits or behavioral characteristics to identify individuals for authentication purposes. It is a new method of verifying identities that is more secure than conventional methods like passwords. A biometric system recognizes patterns from traits like fingerprints, iris patterns, and facial features. Current applications of biometrics include entry control, ATMs, and government programs. While biometrics provides high security, there are also disadvantages like high costs, potential exploitation of biometric data, and changes in traits affecting access. More work is needed to address these disadvantages and make biometrics widely used in security systems.

Uploaded by

Shanthan Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views1 page

Bio Metrics

Biometrics uses biological traits or behavioral characteristics to identify individuals for authentication purposes. It is a new method of verifying identities that is more secure than conventional methods like passwords. A biometric system recognizes patterns from traits like fingerprints, iris patterns, and facial features. Current applications of biometrics include entry control, ATMs, and government programs. While biometrics provides high security, there are also disadvantages like high costs, potential exploitation of biometric data, and changes in traits affecting access. More work is needed to address these disadvantages and make biometrics widely used in security systems.

Uploaded by

Shanthan Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

BIOMETRICS

ABSTRACT: Biometrics is the development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. It is a new method of verifying authenticity. Biometrics uses biological traits or behavioral characteristics to identify an individual. A Biometrics system is actually a pattern recognition system that utilizes various patterns like iris patterns, retina patterns and biological traits like fingerprints, facial geometry, voice recognition and hand recognition etc. What makes Biometrics really attractive is the fact that the various security codes like the passwords and the PIN can be interchanged between people but the physiological traits cant be. The current applications of Biometric authentication are Entry control, ATM's and Government programs. The most obvious use of biometrics for network security is for secure workstation logons for a workstation connected to a network. The main use of Biometric network security will be to replace the current password system. The most popular biometric authentication scheme employed for the last few years has been Iris Recognition. Many companies are adding biometric authentication features to their products for e.g. Key ware Technologies LBV (Layered biometrics verification) Internet toolkit provides high-level security to e-commerce applications. This toolkit finds use in the area of Internet Banking. There are various pros and cons to Biometrics that ought to be considered .The advantages mainly are the high levels of security it provides when compared to conventional methods, the uniqueness of biometric attributes makes them an ideal candidate authenticating users, problems associated with passwords can be avoided and that a Biometric characteristic cant be stolen as opposed to passwords etc. The various disadvantages are the low acceptance rate, high costs associated with Biometric authentication due to the integration into the current network and the acquisition of the hardware and the software, the danger of an individuals biometric data can be exploited and there are instances especially in voice recognition where the individual is restricted access due to a change in Biometric characteristics due to a cold etc. So, all these disadvantages have to be worked upon to ensure that this brilliant technology be incorporated into all the security systems to ensure safer transactions and restricted access to them to prevent any kind of breach of security.

You might also like