Biometric Identification System Project Report

Some of the main problems faced by the network environments authentication, accurate and automatic identification, some of the secret pins in the smart cards may not be enough in certain cases, we need to verify that physically the person to be claimed is said to be biometrics. Biometrics identification is a most costly top secure application, but latest researchers have developed cost-effective, reliable and highly accurate Biometrics identification technology for access.

Biometric Identification System Definition:

Biometric systems are those which identify a user by storing their biological info’s or behaviors and comparing them during that person’s accessor in other words biometric is a non-repeatable trait of us human beings that can automatically reveal one’s identity and details.

The main three levels of security, when implemented in the real life, are

  • The lowest level is used when you have your possession, such as ID.
  • The second level is used as a password for computer login or a PIN code  in your bank ATM cards
  • Third level or the highest level of security is something that you are and something that you do. This is the basic things of biometric technology.

Biometrics systems have different storage options provided such as a database on a central computer, plastic cards (such as strip, barcode, smart cards). The basic architecture of biometric identification consists of 5 main parts namely Data collection, Signal processing, Decision, Data storage, and Transmission.

All the biometrics devices have the same principles of capture, comparison, extraction and matching in common. Some of the biometrics techniques used in human organs for security purposes is basically Eye, in which it uses Iris and retina scanning face recognition, fingerprint scanning, hand geometry, finger geometry, palm, signature, voice recognition.

These techniques are been briefly discussed in this paper. Some of the future techniques in biometrics are DNA scanning, ear Shape, keystroke dynamic scanning, and vein check.

Leave a Reply

Your email address will not be published. Required fields are marked *