Friday, November 8, 2019

Biometric Technology Essays

Biometric Technology Essays Biometric Technology Paper Biometric Technology Paper Biometric Technology is one of the branches of Automated Identification and Data Capture (AIDC). Automated Identification and Data Capture or AIDC is defined as a collection of technologies that are used to identify objects, collection of their data and entering the data in any database, software or computer system without the need of human involvement. â€Å"The family of Automatic Identification and Data Capture technologies can be broken down into six categories which are: biometrics, electromagnetics, magnetics, optical, smart cards, and touch.† (Automated Identification and Data Capture Biometrics Web Site.) Hence, Biometrical technologies refer to the study of measuring the quantitative, physiological and biological characteristics. It is referred to as the most authentic technique of measuring and in identifying. It can be classified into two groups: identification and/or security. â€Å"Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions.† The use of biometrical technologies for the security purpose is used for government at all levels including federal, local and state and in military. As well as many commercial buildings now requires the personal identification using these methods. This reduces the unauthorized persons accessing the non-permissible zone. The branch of identification is used throughout the commercial enterprises including banks to reduce frauds and crimes. (Biometrics- Wikipedia, the free encyclopedia)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There are several types of biometrical technologies that are used for identification. These include.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   â€Å"face: the analysis of facial characteristics  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   fingerprint: the analysis of an individual’s unique fingerprints  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   hand geometry: the analysis of the shape of the hand and the length of the fingers  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   retina: the analysis of the capillary vessels located at the back of the eye  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   iris: the analysis of the colored ring that surrounds the eye’s pupil  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   signature: the analysis of the way a person signs his name.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   vein: the analysis of pattern of veins in the back if the hand and the wrist  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   voice: the analysis of the tone, pitch, cadence and frequency of a person’s voice.†   (What is biometrics?) Fingerprint Identification Fingerprinting identification is the most popular and most widely used biometric technology. The advantage of using fingerprinting identification technology is that no two people in this world have the matching fingerprint. â€Å"Because of their uniqueness and consistency over time, fingerprints have been used for identification for over a century, more recently becoming automated (i.e. a biometric) due to advancements in computing capabilities.† (Not Available) The method of fingerprinting identification has been used since the late nineteenth century. The first characteristic points were introduced by Sir William Hersel and later modified by Sir Francis Galton. Although they are altered with time, the ‘Galton Point’ forms the base of fingerprinting identification. In 1960’s, with the advancement of computer technologies, automation took place. Though, the greatest force behind its development was from the FBI’s request for an Automated Fingerprint Identification System (AFIS).   After which it improved greatly. Fingerprint is defined as the impression of ridges and grooves on the ball of a finger. The impression on paper is seen as the series of dark lines. Fingerprinting imaging technology captures and reads this unique pattern. For the purpose of identification these unique lines or ridges are classified in patterns. They can either be in the form of loop, whorl, arch, or composite. In Loop pattern, most of the area is covered by the two diverging lines called the ‘Type Line.’ And, the point nearest to the divergence of these Type Lines is known as ‘Delta.’ The Loop pattern is visualized when lines or ridges start from one side of the finger and reaches the center, this region in known as ‘core.’ The rides then ‘loops’ and moves back to the same side. Loop pattern is the most common variety seen occurring in about 60-70% of the cases. A whorl pattern must have two ‘deltas.’ Moreover, a Core and Type lines should also present. They are visualized as concentric circles formed by the ridges in the center of the finger. The rest of the pattern shapes itself around these circles. The Arch pattern is the simplest type of fingerprint. In this, ridges enter from one side and exit from the other side. It, also, has the tendency to produce an upward thrust like a wave. In this type, no core, delta or type lines are present. Finally, the Composite pattern which is the rarest pattern occurring only in 1-2% of the people. This pattern is visualized as the combination of any of the two types described above. These patterns and their classifications are used for identification by matching and comparing the fingerprint’s minutiae points which are describes as the point where the ridges end or meet. Minutiae points include the following characteristics: Bifurcation: point where ridges split to form braches. Divergence:- point where parallel ridges are spread apart Enclosure: two parallel ridges come together again after being split into two branches. Ending:- termination of a ridge Valley:- the spaces produced on either side of the finger To collect the digital image of fingerprints a variety of sensors are used. There are a wide range of sensors available such as optical sensors, capacitance, ultrasound and thermal sensors. â€Å"Optical sensors are the most commonly but most expensive used sensor today. Optical fingerprint technologies require the user to place his or her finger on a glass substrate at which point an internal light source from the fingerprint device is projected onto the fingerprint. The image is then captured by a charge-coupled device (CCD)† The Capacitive sensor, which takes each pixel based on the measurement of capacitance. That is, it detects the electrical field around the fingerprints. It uses a sensor chip with a range of circuits to accomplish that. Ultrasound sensors use the reflection of light and takes images using prisms.    Lastly, Thermal sensors create the digital image by the difference in the temperature of the skin and the surface of scanner. (Automated Identification and Data Capture Biometrics Web Site.) Fingerprints are widely used in law enforcement, welfare programs, military, government and financial institutions.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.