Various Aspects of Biometric Security

Page 1

Information Technology


INTRODUCTION •

Biometric consists of two words 'bio' means life and metrics which means 'metrikos'.

Biometric-security is used for the purpose of identification and verification of individual.

For the purpose of identification different biological traits are considered.


Implementation of Biometric Security •

Biometric-security can be implemented in any device by installing the software and providing scanner as an additional hardware to provide input device.

•

Then comparison between provided input and store

data takes places on the basis of that locking and unlocking depends.


To Avail the Best Information Technology Assignment Help Australia

Contact Us:Phone:- +61 879 057 034 Email:- help@instantassignmenthelp.com.au Website:- www.instantassignmenthelp.com.au


Steps involved in investigation The investigation process of biometric-fingerprintscanner depends on three stages such as: •

Image enhancement

Minutiae extraction

Minutiae matching


Image Enhancement Under

this

methodology

image

is

capture

and

processed through algorithm. Stages of algorithm are mentioned below. •

Normalization

Local orientation estimation

Local frequency estimation

Region mask identification

Filtering


Minutiae extraction & matching •

The process of minutiae extraction convert image into binary formate and then compare with other adjacent pixels in order to produce considerable output image.

•

In the process of minutiae matching comparison of image

takes place between the image in database and input one.


Types of fingerprint scanner They are described on the basis of technologies and properties such as mentioned below: •

USB fingerprint devices: They can be attached through USB port and available at cost of 77.77 pound.


Cont... •

Keyboard fingerprint devices: They are attached with keyboard and provide security to user. They are available at price of 124.40 pound.

Fingerprint scanner and card reader: they are provided in the combination of scanner and card reader at the price of 31.03 pound.

Car fingerprint scanner: This is considered as new feature of auto mobiles and available at the price of 27686120.00 pounds.


To Avail the Best Information Technology Assignment Help Australia

Contact Us:Phone:- +61 879 057 034 Email:- help@instantassignmenthelp.com.au Website:- www.instantassignmenthelp.com.au


Reviews of device • USB Fingerprint Device: On the basis of users review. This device is useful for individual as well as businesses for security purpose. As they are provided with USB so they provide easy installation interface to users. And also provided at considerable price. • Keyboard Fingerprint Device: On the basis of users review. This reduces the chances of data lost and stole from individuals device.


Cont... •

Fingerprint Scanner and card reader: On the basis of users review the price of product is affordable along with this it is portable and mobile.

•

Car Fingerprint Scanner: On the basis of users review this decreases the chances of car stolen and also give ride of carrying keys.


Advantages of Biometrics security •

As

the

biological

process traits

involve therefore

identification level

of

through security

automatically get improved. •

As customers are not require to remember password and codes which improves their experience.


Disadvantages of Biometrics security •

The main disadvantage of using biometric security is it is not 100% secure.

•

Secondly, it requires additional hardware such as scanner, camera etc.


Conclusion On the basis of above presentation the following conclusion drawn: •

ICT is used to provide reliable and safe devices to business and industries.

Biometric security devices are produced by ICT.

They use to provide security by using biological traits.


To Avail the Best Information Technology Assignment Help Australia

Contact Us:Phone:- +61 879 057 034 Email:- help@instantassignmenthelp.com.au Website:- www.instantassignmenthelp.com.au


References •

Devaraj, S., Ow, T.T. and Kohli, R., 2013. Examining the impact of information technology and patient flow on healthcare performance: A Theory of Swift and Even Flow (TSEF) perspective. Journal of Operations Management. 31(4). pp.181-192.

Han, K. and Mithas, S., 2013. Information technology outsourcing and non-IT operating costs: An empirical investigation. Mis Quarterly. 37(1). pp.315-331.

Ingebrigtsen, T., Georgiou, A and et.al., 2014. The impact of clinical leadership on

health information technology adoption: systematic review. International journal of medical informatics. 83(6). pp.393-405.


THANK YOU


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.