Page 83 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 83
Unit 6: Biometric Controls for Security
6.4.2 Hand Geometry Notes
Hand geometry is a method that captures the physical traits of a user’s hand and fingers.
It examines finger image ridge endings, branches made by ridges. These systems gauge and
record the length, width, thickness, and surface area of an individual’s hand. It is accessed in
applications like access control and time and attendance etc. It is easy to use, relatively not costly
and broadly accepted. A camera captures a three dimensional image of the hand. A verification
template is formed and accumulated in the database and is compared to the template at the time
of confirmation of a person. Fingerprint identification. Presently fingerprint readers are being
constructed into computer memory cards for use with laptops or PCs and also in cellular
telephones, and personal digital assistants. It is successfully executed in the area of physical
access control.
6.4.3 Eye Recognition
This method includes scanning of retina and iris in eye. Retina scan method maps the capillary
pattern of the retina, a thin nerve on the back of the eye. A retina scan gauges patterns at over 400
points. It examines the iris of the eye, which is the colored ring of tissue that surrounds the pupil
of the eye. This is a very mature technology with a proven track record in a number of application
areas. Retina scanning captures individual pattern of blood vessels where the iris scanning
captures the iris. The user must focus on a point and when it is in that position the system
accesses a beam of light to capture the unique retina traits. It is broadly secure and accurate and
used heavily in controlled environment. However, it is expensive, secure and needs perfect
alignment and generally the user must look in to the device with proper focus. Iris recognition
is one of the most reliable biometric recognition and verification methods. It is accessed in
airports for travellers. Retina scan is used in military and government organization. Organizations
use retina scans initially for authentication in high-end security applications to control access.
Example: Government buildings, military operations or other limited quarters, to
authorized personnel only.
The unique pattern and traits in the human iris remain unchanged during one’s lifetime and no
two persons in the world can have the same iris outline.
6.4.4 Voice Biometrics
Voice biometrics, accesses the person’s voice to verify or recognize the person. It confirms as
well as identifies the speaker. A microphone on a standard PC with software is needed to
examine the unique traits of the person. It is mainly used in telephone-based applications. Voice
verification is simple to use and does not need a great deal of user education. To enroll, the user
speaks a provided pass phrase into a microphone or telephone handset. The system then forms
a template based on various traits, including pitch, tone, and shape of larynx. Generally, the
enrollment procedure takes less than a minute for the user to accomplish. Voice verification is
one of the least intrusive of all biometric methods. Moreover, voice verification is simple to use
and does not need a great deal of user education.
Task Discuss the functioning of voice biometrics.
LOVELY PROFESSIONAL UNIVERSITY 77