Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics such as finger scan, retina, iris, voice scan, signature scan etc. This method of identification is preferred over traditional
methods involving passwords and PIN numbers for various reasons: the person to be identified is required to be physically present at the point-of-identification; identification based on biometric techniques obviates the need to remember a password or carry a token. With the increased use of computers as vehicles of information technology, it is necessary to restrict access to sensitive/personal data. By replacing PINs, biometric techniques can potentially prevent unauthorized access to or fraudulent use of ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. A biometric system is essentially a pattern recognition system, which makes a personal identification by determining the authenticity of a specific physiological, or behavioral characteristics possessed by the user. An important issue in designing a practical system is to determine how an individual is identified. Depending
on the context, a biometric system can be either a verification (authentication) system or an identification system.

Biometrics is a rapidly evolving technology, which is being widely used in forensics such as criminal identification and prison security, and has the potential to be used in a large range of civilian application areas. Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. It can be used during transactions conducted via telephone and Internet (electronic commerce and electronic banking). In automobiles, biometrics can replace keys with key-less entry devices Biometrics technology allows determination and verification of one's identity through physical characteristics. To put it simply, it turns your body into your password. These characteristics can include face recognition, voice recognition, finger/hand print scan, iris scans and even retina scans. Biometric systems have sensors that pick up a physical characteristic, convert it into a digital pattern and compare it to stored patterns for identification

Identification And Verification Systems
A person?s identity can be resolved in two ways: identification and verification. The former involves identifying a person from all biometric measurements collected in a database and this involves a one-to-many match also referred to as a ?cold search?. ?Do I know who you are?? Is the inherent question this process seeks to answer. Verification involves authenticating a person?s claimed identity from his or her previously enrolled pattern and this involves a one-to-one match. The question it seeks to answer is, ?Are you claim to be??

Verification requires comparing a person?s fingerprint to one that pass previously recorded in the system database. The person claiming an identity provided a fingerprint, typically by placing a finger on an optical scanner. The computer locates the previous fingerprint by looking up the person?s identity. This process is relatively easy because the computer needs to compare two-fingerprint record (although most systems use two fingerprints from each person to provide a safety factor). The verification process is referred as a ?closed search? because the search field is limited. The second question is ?who is this person?? This is the identification function, which is used to prevent duplicate application or enrollment. In this case a newly supplied fingerprint is supplied to all others in the database. A match indicates that the person has already enrolled/applied.

The identification process, also known as an ?open search?, is much more technically demanding. It involves many more comparisons and may require differentiating among several database fingerprints that are similar to the objects.
please read for Bio-metrics and Bio-metrics seminar report

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: xbl bio creator, academia bio ritmo, ppt on quality of object oriented systems using object oriented metrics, security metrics first data, bio oxidizer, seminaar on bio topic, bio compter,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Bio-Molecular Computing computer science crazy 1 2,032 06-02-2012, 12:49 PM
Last Post: seminar addict
  Bio-inspired Robotics seminar surveyer 0 1,795 24-01-2011, 05:19 PM
Last Post: seminar surveyer
Lightbulb Micro-fabricated Bio-sensors seminar projects crazy 0 2,714 27-01-2009, 10:23 AM
Last Post: seminar projects crazy
Lightbulb Nano-Bio (Bio-Nano) Frontier: seminar projects crazy 0 2,435 21-01-2009, 12:56 AM
Last Post: seminar projects crazy
  Wearable Bio-Sensors computer science crazy 0 1,890 21-09-2008, 10:25 AM
Last Post: computer science crazy

Forum Jump: