Preview

Implementing Biometrics Abstract

Good Essays
Open Document
Open Document
471 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Implementing Biometrics Abstract
Final Paper Proposal:
Implementing Biometrics: A Las Vegas Casino Case Study

Name: Christopher Tucker
Northwestern University SCS

Biometrics is a way of identifying individuals based on biological and behavioral traits. Although biometric systems have been tested for a few decades, only until recent has the technology entered public awareness due to its increased usage amongst government programs and corporations. Biometrics are primarily implemented for identity access management for information system purposes, and access control such as unlocking a vehicle or entering a secured location in a building. Examples of characteristics measured by biometric systems include: face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. When implementing a typical biometric system, one thing to note are five components which include a sensor, signal processing algorithms, data storage, matching algorithms, and decision processing. Biometric standards are being developed on national and international levels. The purpose of creating these standards is to create a simpler environment for deployment of biometric systems across organizations. Standards will also help reduce the cost and enable interoperability. Standards are being developed for technical interfaces, data interexchange formats, testing and reporting, and societal issues. Some of the organizations developing biometric standards include InterNational Committee for Information Technology Standards (INCITS) M1, National Institute of Standards and Technology, and Organization for Advancement of Structured Information Standards (OASIS). Like anything, there are advantages and disadvantages to biometrics. Some of the challenges organizations face when implementing a biometrics system is due to the lack of understanding of the technology and the environment in which the system will be implemented. The overall goal of the system is to uniquely identify based of physical or

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    However the American National Standards Institute (ANSI) and National Institute for Science (NIST) standards were routinely required for new systems. The Biometric Standards were what elucidated the limitations of demographic based searches. The substituting of data was crucial for standards and Interoperability. All the standards have limits in images and minutiae M-1 is strictly 1:1, the interoperability is based upon images and all major automatic fingerprint identification system (AFIS) venders have deployed complaints with those standards and the venders have all delivered standards complaint images. The standards are not the complete solution for interoperability, automatic fingerprint identification system (AFIS) technology balances on three main areas. The first one is reliability, which is to find the culprit, the automatic fingerprint identification system (AFIS) requirement for this is 95%. The second one is the selectivity of misidentifying, which was set at as requirement of 1%. Finally, filter or penetration rate, this is how much of the data is search biometrically, automatic fingerprint identification system (AFIS) was 2% of this fingerprint database. With these three criteria’s, a system performance was measured in speed, accuracy, transaction volume and flexibility. The systems performance requirements evolve so the system must adopt to that evolution and the…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Answer: Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. Biometric authentication provides strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive. Biometric authentication is in the early stages of adoption. Because of its strength, it likely will see increased usage in the future. It is also likely that legislators will pass laws governing the use, storage, and protection requirements for biometric data.…

    • 4641 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Final Paper

    • 2626 Words
    • 8 Pages

    Curt, S., & Fernandez, L. (2012). Aviation Security-biometrics Technology and Risk Based Secuity Aviation Passenger Screening Program.…

    • 2626 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    This is a bit more new invention and not a lot of organisations are using it as it is very expensive security measure. Biometric scanners are used to scan people’s face, fingerprints, iris, hand geometry vein or voice as every single person has it different. The most famous and used identification is through fingerprints as it is easy to check. The scanner will take a picture of one of your fingers and then it will be saved and used in a binary code. Furthermore, the algorithm is assigned to one person so if the same person’s is scanned once more, the system will match it straight with the previous binary code and this is enabling recognition.…

    • 1153 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Biometric data is being used to identify an individual nowadays because identity theft is a common fear, but this data could also be collected…

    • 1144 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems.…

    • 264 Words
    • 2 Pages
    Good Essays
  • Good Essays

    One of the newer automated systems that have been implemented is IAFIS (integrated automated fingerprint identification…

    • 1153 Words
    • 5 Pages
    Good Essays
  • Good Essays

    As the foregoing review suggests, the use of biometric technologies poses a host of interrelated policy questions, some of which are of general applicability to all biometric systems and others of which are technology- or use-specific. Among the questions one might ask are: Can the biometric system be narrowly tailored to its task? Who will oversee the program? What alternatives are there to biometric technologies? What information will be stored and in what form? To what facility/location will the biometric give…

    • 668 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Identification

    • 1157 Words
    • 5 Pages

    Shanker, Thom. Biometric Scans Help U.S Track Militants. 15 July 2011. 24 Oct. 2012 <http://sks.sirs.com/cgi-bin/hst-article-display?id=SGA1017-0-7305&artno=0000315989&type=ART&shfilter=U&key=Biometric%20identification&title=Biometric%20Scans%20Help%20U%2ES%2E%20Track%20Militants&res=Y&ren=N&gov=N&lnk=Y&ic=N>.…

    • 1157 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometric Systems

    • 491 Words
    • 2 Pages

    are the most reliable but most people hate the idea of a laser shooting into…

    • 491 Words
    • 2 Pages
    Good Essays

Related Topics