A Study of Biometrics Security System
##plugins.themes.academic_pro.article.main##
Abstract
Security is ubiquitous. Need of security is the basic necessity of any individual or a system. The feeling that you are safe and everything around you is all right is imperative for a peaceful living. But in this unsafe world, when crime, terror and threats are on their peak, how can one attain that sense of security? Cross-border travel, crime and fraud are now easier than ever before. Biometric technology offers a reliable and cost effective way to manage identities for security and authentication purposes.
Biometrics are automated methods of recognizing a person based on a physiological or behavioural characteristic. Among the features measured are; face, Emotion, age, gender, fingerprints, hand geometry, handwriting, iris, retina, vein, signature, DNA and voice. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in computer security, federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Biometric methods can also be multimodal. Biometrics do have pros and cons. They are seductive, unique hard to forge identifiers but, they are not secrets. Some biometrics are easy to steal. However, with few limitations the biometrics technology is currently on a leading edge.
Biometrics are automated methods of recognizing a person based on a physiological or behavioural characteristic. Among the features measured are; face, Emotion, age, gender, fingerprints, hand geometry, handwriting, iris, retina, vein, signature, DNA and voice. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in computer security, federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Biometric methods can also be multimodal. Biometrics do have pros and cons. They are seductive, unique hard to forge identifiers but, they are not secrets. Some biometrics are easy to steal. However, with few limitations the biometrics technology is currently on a leading edge.