Page 83 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 83

Unit 6: Biometric Controls for Security




          6.4.2 Hand  Geometry                                                                  Notes

          Hand  geometry is a method that captures the physical traits of  a user’s  hand and  fingers.
          It examines finger image ridge endings, branches made by ridges. These systems gauge and
          record the length, width, thickness, and surface area of an individual’s hand. It is accessed in
          applications like access control and time and attendance etc. It is easy to use, relatively not costly
          and broadly accepted. A camera captures a three dimensional image of the hand. A verification
          template is formed and accumulated in the database and is compared to the template at the time
          of confirmation of a person. Fingerprint identification. Presently fingerprint readers are being
          constructed into  computer memory cards for use with laptops or PCs and  also in  cellular
          telephones, and personal digital assistants. It is successfully executed in the area of physical
          access control.

          6.4.3 Eye Recognition

          This method includes scanning of retina and iris in eye. Retina scan method maps the capillary
          pattern of the retina, a thin nerve on the back of the eye. A retina scan  gauges patterns at over 400
          points. It examines the iris of the eye, which is the colored ring of tissue that surrounds the pupil
          of the eye. This is a very mature technology with a proven track record in a number of application
          areas. Retina scanning captures individual pattern of blood vessels where  the iris  scanning
          captures the  iris. The  user must focus on a point and when it is  in that position the  system
          accesses a beam of light to capture the unique retina traits. It is broadly secure and accurate and
          used heavily in controlled environment. However, it is expensive, secure and needs perfect
          alignment and generally the user must look in to the device with proper focus. Iris recognition
          is one  of the most reliable biometric recognition and verification  methods. It is accessed in
          airports for travellers. Retina scan is used in military and government organization. Organizations
          use retina scans initially for authentication in high-end security applications to control access.


                 Example: Government  buildings, military  operations  or other  limited  quarters, to
          authorized personnel only.
          The unique pattern and traits in the human iris remain unchanged during one’s lifetime and no
          two persons in the world can have the same iris outline.

          6.4.4 Voice  Biometrics

          Voice biometrics, accesses the person’s voice to verify or recognize the person. It confirms as
          well as identifies  the speaker. A microphone on a  standard PC with software  is needed to
          examine the unique traits of the person. It is mainly used in telephone-based applications. Voice
          verification is simple to use and does not need a great deal of user education. To enroll, the user
          speaks a provided pass phrase into a microphone or telephone handset. The system then forms
          a template based on various traits, including pitch, tone, and shape of larynx. Generally, the
          enrollment procedure takes less than a minute for the user to accomplish. Voice verification is
          one of the least intrusive of all biometric methods. Moreover, voice verification is simple to use
          and does not need a great deal of user education.





              Task  Discuss the functioning of voice biometrics.







                                           LOVELY PROFESSIONAL UNIVERSITY                                   77
   78   79   80   81   82   83   84   85   86   87   88