SlideShare a Scribd company logo
1 of 8
Download to read offline
BIOMETRIC
TECHNOLOGY
SYSTEMS
Students:
AHMED NIHAD
Supervisor:
MR. MOHAMMED ABDULRAZAQ
1
Introduction
- Main Content……………………………………...……………………1
- What is Biometrics…………………………………...……………….2
- How Biometrics work…………………………………….…………...2
- Why is a biometric system used…………………………………....3
- Where is a biometric system used…………………………..……..4
- Types of Biometrics………………………………………………......4
- Biometric First use…………………………………………………....5
- Advantages and Disadvantages…………………………………....6
- References.……………………………………………………………..7
2
What is Biometrics?
Biometric systems are using personal characteristics (directly linked to
who you are) to authenticate or identify a person. A system collects
biometric characteristics unique to every person. These biometric
characteristics are then directly linked to verify or identify the individual.
A biometric system will involve running data through algorithms for a
particular result, usually related to a positive identification of a user or
other individual. [1]
How Biometrics work
A biometric system works with the obtained biometric data of a person,
from which a special algorithm selects characteristics to create a biometric
template. The system can then verify the identity of the person in
reference to the biometric database. It can do so in a second, while
comparing hundreds of millions of biometric data in the database.
There are three main characteristics on which we can measure the
performance of a biometric system.
3
Why is a biometric system used?
Although biometrics is mostly considered a modern technology, biometrics
has been practically used since the 19th century. One of the first
applicable fields was in the police and criminal departments. Collecting
the measurements of unique characteristics of humans proved to be
successful. However, the process of manually matching and comparing
biometric patterns was difficult to perform effectively and was too time-
consuming. Also, the possibility of human error plays its role too.
Nowadays, a complex system with modern technology is based on
artificial intelligence and neural networks. Thanks to high-performing
algorithms, awarded by NIST, successful facial recognition can be done
even from low-quality or blurry pictures. This brings advantages to the
biometric system, which can perform exceptionally fast, even when
matching a biometric input in a large database. [2]
4
Where is a biometric system used?
Biometric technology is fast-growing, whether in the fields of government,
law enforcement or enterprise. The convenience of a biometric system
brings benefits to millions of people while making various processes much
easier and more accessible. The main advantages of implementing
biometric systems are time efficiency, reliability, and precision of the
results. For example, Innovatrics Biometric Identity Management System
is built to suit the needs of any project even with minimal hardware
requirements.
Types of Biometrics [3]
Fingerprints
Face deception
Hand deception
Eyes recognition
Voice recognition
Digital signatures
Digital PIN dynamic
5
Biometric First use
In 1969, the Federal Bureau of Investigation (FBI) began its push to
develop a system to automate its fingerprint identification process, which
was quickly becoming overwhelming and required many man-hours. The
FBI contracted the National Institute of Standards and Technology (NIST)
to study the process of automating fingerprint identification. NIST
identified two key challenges: 1/ scanning fingerprint cards and identifying
minutiae and 2/ comparing and matching lists of minutiae. [4]
Finger print in 1970s.
6
Advantages and Disadvantages
The system makes the authentication process quick and easy; however,
it has other advantages that are:
 Hard to steal, unlike passwords.
 Easy and simple to use.
 Non-transferrable, for everyone has access to a unique set of
biometrics.
 Efficient because templates take up in data with less storage.
Despite increased security, efficiency, and convenience, biometric
authentication and its uses in modern-day tech and digital applications
also has disadvantages:
 High Costs.
 Systems can still be hacked.
 Devices like facial recognition systems can limit privacy for users.
 False rejects and false accepts can still preventing select users from
accessing systems. [5]
7
References
1. https://en.wikipedia.org/wiki/Biometrics/
2. https://www.sciencedirect.com/topics/computer-science/biometric-
technology
3. https://www.biometricsinstitute.org/what-is-biometrics/types-of-
biometrics/
4. https://www.thalesgroup.com/en/markets/digital-identity-and-
security/government/inspired/biometrics/
5. https://www.123helpme.com/essay/Advantages-And-
Disadvantages-Of-Biometrics-514059

More Related Content

Similar to Biometric technology 2023 report.pdf

Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technologyijtsrd
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMijsptm
 
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...ijtsrd
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
IRJET-  	  E-Voting System for Election using Fingerprint and Aadhar NumberIRJET-  	  E-Voting System for Election using Fingerprint and Aadhar Number
IRJET- E-Voting System for Election using Fingerprint and Aadhar NumberIRJET Journal
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYsumitgupta575
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESijsptm
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 

Similar to Biometric technology 2023 report.pdf (20)

Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
Biometrics
BiometricsBiometrics
Biometrics
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
IRJET-  	  E-Voting System for Election using Fingerprint and Aadhar NumberIRJET-  	  E-Voting System for Election using Fingerprint and Aadhar Number
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGY
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Biometric technology 2023 report.pdf

  • 2. 1 Introduction - Main Content……………………………………...……………………1 - What is Biometrics…………………………………...……………….2 - How Biometrics work…………………………………….…………...2 - Why is a biometric system used…………………………………....3 - Where is a biometric system used…………………………..……..4 - Types of Biometrics………………………………………………......4 - Biometric First use…………………………………………………....5 - Advantages and Disadvantages…………………………………....6 - References.……………………………………………………………..7
  • 3. 2 What is Biometrics? Biometric systems are using personal characteristics (directly linked to who you are) to authenticate or identify a person. A system collects biometric characteristics unique to every person. These biometric characteristics are then directly linked to verify or identify the individual. A biometric system will involve running data through algorithms for a particular result, usually related to a positive identification of a user or other individual. [1] How Biometrics work A biometric system works with the obtained biometric data of a person, from which a special algorithm selects characteristics to create a biometric template. The system can then verify the identity of the person in reference to the biometric database. It can do so in a second, while comparing hundreds of millions of biometric data in the database. There are three main characteristics on which we can measure the performance of a biometric system.
  • 4. 3 Why is a biometric system used? Although biometrics is mostly considered a modern technology, biometrics has been practically used since the 19th century. One of the first applicable fields was in the police and criminal departments. Collecting the measurements of unique characteristics of humans proved to be successful. However, the process of manually matching and comparing biometric patterns was difficult to perform effectively and was too time- consuming. Also, the possibility of human error plays its role too. Nowadays, a complex system with modern technology is based on artificial intelligence and neural networks. Thanks to high-performing algorithms, awarded by NIST, successful facial recognition can be done even from low-quality or blurry pictures. This brings advantages to the biometric system, which can perform exceptionally fast, even when matching a biometric input in a large database. [2]
  • 5. 4 Where is a biometric system used? Biometric technology is fast-growing, whether in the fields of government, law enforcement or enterprise. The convenience of a biometric system brings benefits to millions of people while making various processes much easier and more accessible. The main advantages of implementing biometric systems are time efficiency, reliability, and precision of the results. For example, Innovatrics Biometric Identity Management System is built to suit the needs of any project even with minimal hardware requirements. Types of Biometrics [3] Fingerprints Face deception Hand deception Eyes recognition Voice recognition Digital signatures Digital PIN dynamic
  • 6. 5 Biometric First use In 1969, the Federal Bureau of Investigation (FBI) began its push to develop a system to automate its fingerprint identification process, which was quickly becoming overwhelming and required many man-hours. The FBI contracted the National Institute of Standards and Technology (NIST) to study the process of automating fingerprint identification. NIST identified two key challenges: 1/ scanning fingerprint cards and identifying minutiae and 2/ comparing and matching lists of minutiae. [4] Finger print in 1970s.
  • 7. 6 Advantages and Disadvantages The system makes the authentication process quick and easy; however, it has other advantages that are:  Hard to steal, unlike passwords.  Easy and simple to use.  Non-transferrable, for everyone has access to a unique set of biometrics.  Efficient because templates take up in data with less storage. Despite increased security, efficiency, and convenience, biometric authentication and its uses in modern-day tech and digital applications also has disadvantages:  High Costs.  Systems can still be hacked.  Devices like facial recognition systems can limit privacy for users.  False rejects and false accepts can still preventing select users from accessing systems. [5]
  • 8. 7 References 1. https://en.wikipedia.org/wiki/Biometrics/ 2. https://www.sciencedirect.com/topics/computer-science/biometric- technology 3. https://www.biometricsinstitute.org/what-is-biometrics/types-of- biometrics/ 4. https://www.thalesgroup.com/en/markets/digital-identity-and- security/government/inspired/biometrics/ 5. https://www.123helpme.com/essay/Advantages-And- Disadvantages-Of-Biometrics-514059