2. Introduction
Computers play an important role in our daily lives and their
use has grown today. With continuous increase
Request security regulations around the world and a large
number of services are provided using the Internet in the day
To daily life, ensuring security associated with such services
has become a critical issue. Biometrics are the key
Future data / cybersecurity. This research provides a
biometric data recognition system that can be included
In any system involves access control, e-commerce, online
banking, login to the computer etc. to enhance security.
Fingerprint is an old and mature technique used in this work
as a biological advantage. In this research
Fingerprint recognition system, facial recognition system and
eye recognition system
3. Biomarkers are a process used to identify or document an
individual using any physical or behavioral characteristics.
These characteristics can include - but are not limited to -
fingerprints, hand shape, retina scan, iris, face mapping,
signature or writing method, and recently DNA maps.
While relatively new, biometrics is rapidly advancing and
growing in acceptance and use. Biometrics is used by
governments for passports, airports and site securities.
Fingerprints and DNA are used by policing agencies for
forensic and identification purposes. Disney World uses
fingerprint scanners at the entrance of is theme parks for
season pass holders and resort guests. Casinos use face
recognition technology to detect known scam artists.
But with any new technology comes peril amid its promise,
and biometrics is no exception. The same biometric methods
that an organization employs for greater security can be
turned against them by intruders. If risk managers are to
realize the full potential of biometrics, they must learn its
vulnerabilities and how to use this tool with risk management
in mind.
For risk managers, the importance of this emerging
technology does not necessarily lie in learning the intricacies
of how biometric science works, but in exploring the
management of the exposures biometrics present to
individuals, businesses and governments. This process begins
with identifying the cyber-risk exposures that biometrics
makes possible.
System vulnerability. Weak points in cyber-systems are
identified in various internal network entry points and
integral components such as workstations, employee
awareness, servers, databases, mainframes, mobile users and
4. remote users. In addition, external network influences that
pose weak points include vendors, customers and partners.
System circumvention. This involves using systems in ways
they were not intended. For example, hackers can gain access
to a system using hardware and software weaknesses. Once a
system's weakness has been found, it gives intruders the
ability to use, sell, alter or destroy the data stored on it. The
weakness could be from inadequate network security, or
leaked or stolen passwords. Hackers may include terrorists,
stalkers, abusive ex-spouses, blackmailers or organized crime.
There is no single profile that encompasses all hackers, either
by the methods they use or by their motives for invading data
systems.
Verification fraud. Circumvention of the system during the
process of verification itself can be achieved in a number of
ways. A perpetrator may be able to force an individual with
registered biometrics to provide his biometric sample (i.e.,
fingerprint, iris scan, etc.) enabling entry to the network. Or
on a more grisly note, an amputated finger or hand could be
applied to a scanner.
Facsimiles of the actual biometric could allow unauthorired
access into a system. For example, the employment of a
digitally copied iris printed on a contact lens and applied to
the eye of a perpetrator could fool an iris scanning system
into allowing entry.
A "hill climbing attack" employs a pattern recognition method
that allows for guessing the reference data
5. For example
There is a system of identification of the retina is now used in
several places in the government departments, airports, banks,
passports and hospitals, and works in the following way
Iris Recognition It is a biometric identification method that
works with mathematical pattern-recognition techniques on
video images. The complex metrics of this identification
system are unique, fast and stable compare to other
modalities.
6. Why use biometrics?
There are more people on Earth than ever before, owning
more things, and swapping more information every single
day. Security has never been more important but—ironically,
thanks to the computing power at everyone's disposal—never
easier to crack. Traditionally, security relies on things that are
difficult to do quickly: locks are physically difficult to bust
open without the correct metal keys, while information
secured by encryption (computerized scrambling) is hard to
access without the right mathematical keys. But this kind of
security has a basic flaw: with the right key, even the wrong
person can quickly gain access.
Most security experts think biometrics (body measurement) is
the answer. Instead of restricting access to things through
arbitrary locks and keys, we grant access to people if we can
positively identify them by measuring some unique pattern on
their body. If you think about it, an ordinary passport photo is
a crude example of biometrics. When the border guards look
at your face and compare it with your passport photo, what
they're doing is intuitively comparing two images. Is one nose
bigger than another? Are the eyes further apart? That's simple
biometrics. The trouble is that our faces change all the time
and lots of people look very similar. Fingerprints are a more
reliable form of biometrics, but even they're not infallible:
illnesses and injuries, as well as basic wear-and-tear, can alter
the pattern of ridges on our fingers in time. Iris scans are a
much more reliable way of identifying people—simplying by
taking quick photographs of their eyes
7. Start using biometrics and where to get
Since 1800 fingerprint information has been collected from
human fingers and hands through ink and paper. For the
purposes of this document, the term "footprint" is used to
mean the details of the skin surface friction layer of a part of
the hand, such as a single fingerprint or the entire hand.
Fingerprints are an example of biometrics that can be used to
identify individuals. Other biometrics that are used to identify
individuals are hand, sound, iris, retina and facial
characteristics.
In recent years, many electronic fingerprint scanning systems
have been developed using optical methods, capacitance,
direct pressure, thermal methods and ultrasound. Ultrasound-
based methods have proved to be extremely accurate, as they
are isolated from the effects of grease, dirt, paint, ink and
other image contaminants. Fingerprint scanning systems now
appear in places where ink and paper selection methods are
not desirable. Because fingerprint scanners are easy to use
and do not leave a messy mark on the person being identified,
fingerprint scanners are used to identify individuals in many
situations. For example, it is now common to find biological
scanners used in security systems to identify authorized
personnel. Some of these security systems determine
whether an individual is authorized to enter a building by
scanning the individual's fingerprint for a biometric sample,
and then comparing the biometric sample with the fingerprint
samples stored in a database that are known to come from
authorized individuals. When a matching sample is found in
the database, an individual may be allowed into the building.
8. In order to allow greater use of biometric scanners, biopsies
should often be installed in new or existing facilities. There is
a need to prevent the removal of the biometric scanner from
the installation. Thus, a biometric security system is needed
that can be installed on new or existing facilities
9. Conclusion
This research introduces fingerprint recognition, facial
recognition and eye recognition
Which can be used for computer login, access control,
Internet
Banking or other applications where security is a concern.
Biometrics are used effectively as a safeguard against
Cyber Crime. In this work fingerprint recognition system and
others
Developed and linked to electronic services to increase the
degree of protection and safety
Especially the difficulty of forging these fingerprints