Intrinsic Traits Computer Science Identity Access Management Access Control Surveillance
Intrinsic Traits Computer Science Identity Access Management Access Control Surveillance
Intrinsic Traits Computer Science Identity Access Management Access Control Surveillance
Physiological are related to the shape of the body. Examples include, but are not limited
to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which
has largely replaced retina, and odor/scent.
Behavioral are related to the behavior of a person. Examples include, but are not limited
to typing rhythm, gait, and voice. Some researchers[1] have coined the term
behaviometrics for this class of biometrics.
It is possible to understand if a human characteristic can be used for biometrics in terms of the
following parameters:[2]
The first time an individual uses a biometric system is called an enrollment. During the enrollment,
biometric information from an individual is stored. In subsequent uses, biometric information is
detected and compared with the information stored at the time of enrollment. Note that it is crucial
that storage and retrieval of such systems themselves be secure if the biometric system is to be robust.
The first block (sensor) is the interface between the real world and the system; it has to acquire all the
necessary data. Most of the times it is an image acquisition system, but it can change according to the
characteristics desired. The second block performs all the necessary pre-processing: it has to remove
artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some kind of
normalization, etc. In the third block necessary features are extracted. This step is an important step as
the correct features need to be extracted in the optimal way.
The United States government has become a strong advocate of biometrics with the increase in
fear of terrorism since September 11, 2001.
The FBI is currently spending $1 billion to create a new biometric database, which will store
DNA, fingerprints, and other biometric data. The computers running the database will be
contained in an underground facility about the size of a football field.
The biometrics market in Germany will experience enormous growth until 2009. “The market size will
increase from approximately 12 million € (2004) to 377 million €” (2009). “The federal government will
be a major contributor to this development”
India
India has planned an ambitious mega project. To provide a unique identification number to each
of its 1.25 billion people. The Identification number will be stored in a central databases.
consisting the biometric information of the individual. If implemented, this would be the biggest
implementation of the Biometrics in the world.
Fingerprint scanners used in some schools to facilitate the subtraction of funds from an account
financed by parents for the payment of school dinners. By using such a system nutritional reports
can be produced for parents to surveil a child's intake.
Australia is the first country to introduce a Biometrics Privacy Code, which is established and
administered by the Biometrics Institute. The Biometrics Institute Privacy Code Biometrics Institute
forms part of Australian privacy legislation.
Canada
Canada has begun research into the use of biometric technology in the area of border security
and immigration. Citizenship and Immigration Canada and the Canada Border Services Agency
will probably be the first government institutions to fully implement the technology in Canada.
New Zealand
SmartGate was launched by the New Zealand government at Auckland International Airport on
Thursday December 3, 2009. It will begin operating in Wellington and Christchurch from next
year.
The kiosk and gate system will allow all New Zealand and Australian electronic passport holders
over 18 to clear passport control without needing to have their identity checked by a Customs
officer.
The advantages of biometrics are the person is the key so you need never remember your card or
key again. Each body part is unique and Biometrics uses your unique identity to enable a
purchase activate something or unlock something. Biometrics encompasses Voice, Vein, Eye,
Fingerprint, Facial recognition and more.
The disadvantages are numerous however: criminals have been known to remove fingers to open
biometric locks, Biometrics requires a lot of data to be kept on a person, these systems are not
always reliable as human beings change over time if you are ill; eyes puffy, voice hoarse or your
fingers are rough from laboring for example it maybe more difficult for the machinery to identify
you accurately. Every time you use Biometrics you are being tracked by a database bringing up a
range of privacy issues. The final disadvantage is the expense and technical complexity of such
systems.
* Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!
* Offer significant cost savings or increasing ROI in areas such as Loss Prevention or
Time & Attendance.