2. 1
Introduction
- Main Content……………………………………...……………………1
- What is Biometrics…………………………………...……………….2
- How Biometrics work…………………………………….…………...2
- Why is a biometric system used…………………………………....3
- Where is a biometric system used…………………………..……..4
- Types of Biometrics………………………………………………......4
- Biometric First use…………………………………………………....5
- Advantages and Disadvantages…………………………………....6
- References.……………………………………………………………..7
3. 2
What is Biometrics?
Biometric systems are using personal characteristics (directly linked to
who you are) to authenticate or identify a person. A system collects
biometric characteristics unique to every person. These biometric
characteristics are then directly linked to verify or identify the individual.
A biometric system will involve running data through algorithms for a
particular result, usually related to a positive identification of a user or
other individual. [1]
How Biometrics work
A biometric system works with the obtained biometric data of a person,
from which a special algorithm selects characteristics to create a biometric
template. The system can then verify the identity of the person in
reference to the biometric database. It can do so in a second, while
comparing hundreds of millions of biometric data in the database.
There are three main characteristics on which we can measure the
performance of a biometric system.
4. 3
Why is a biometric system used?
Although biometrics is mostly considered a modern technology, biometrics
has been practically used since the 19th century. One of the first
applicable fields was in the police and criminal departments. Collecting
the measurements of unique characteristics of humans proved to be
successful. However, the process of manually matching and comparing
biometric patterns was difficult to perform effectively and was too time-
consuming. Also, the possibility of human error plays its role too.
Nowadays, a complex system with modern technology is based on
artificial intelligence and neural networks. Thanks to high-performing
algorithms, awarded by NIST, successful facial recognition can be done
even from low-quality or blurry pictures. This brings advantages to the
biometric system, which can perform exceptionally fast, even when
matching a biometric input in a large database. [2]
5. 4
Where is a biometric system used?
Biometric technology is fast-growing, whether in the fields of government,
law enforcement or enterprise. The convenience of a biometric system
brings benefits to millions of people while making various processes much
easier and more accessible. The main advantages of implementing
biometric systems are time efficiency, reliability, and precision of the
results. For example, Innovatrics Biometric Identity Management System
is built to suit the needs of any project even with minimal hardware
requirements.
Types of Biometrics [3]
Fingerprints
Face deception
Hand deception
Eyes recognition
Voice recognition
Digital signatures
Digital PIN dynamic
6. 5
Biometric First use
In 1969, the Federal Bureau of Investigation (FBI) began its push to
develop a system to automate its fingerprint identification process, which
was quickly becoming overwhelming and required many man-hours. The
FBI contracted the National Institute of Standards and Technology (NIST)
to study the process of automating fingerprint identification. NIST
identified two key challenges: 1/ scanning fingerprint cards and identifying
minutiae and 2/ comparing and matching lists of minutiae. [4]
Finger print in 1970s.
7. 6
Advantages and Disadvantages
The system makes the authentication process quick and easy; however,
it has other advantages that are:
Hard to steal, unlike passwords.
Easy and simple to use.
Non-transferrable, for everyone has access to a unique set of
biometrics.
Efficient because templates take up in data with less storage.
Despite increased security, efficiency, and convenience, biometric
authentication and its uses in modern-day tech and digital applications
also has disadvantages:
High Costs.
Systems can still be hacked.
Devices like facial recognition systems can limit privacy for users.
False rejects and false accepts can still preventing select users from
accessing systems. [5]