Académique Documents
Professionnel Documents
Culture Documents
CONTENTS
1.INTRODUCTION
2.HISTORY
3. POPULAR BIOMETRIC TECHNOLOGIES
FINGER RECOGNITION
FACE RECOGNITION
HAND RECOGNITION
IRIS RECOGNITION
VOICE RECOGNITION
SIGNATURE RECOGNITION
4. PROPERTIES
5. APPLICATIONS
6.FUTURE APPLICATIONS
7. DRAWBACKS
8 CONCLUSION
9.BIBLOGRAPHY
electronically, Instead of with pencil and paper
or face to face. This growth in electronic
transactions has resulted in a greater demand
for fast and accurate user identification and
authentication.Traditional means of security
using personal identification numbers (PINs)
through passwords or security-access cards
(smart cards) has a major drawback. They
recognize the PIN but not the person who has
provided it. So we would like to give information
on more secured way, which is biometrics
security.
PROPERTIES:
APPLICATIONS:
Large volumes of fingerprints are collected and stored everyday in a wide range of applications
including forensics, access control, and driver license registration.
Geometry scanners verify identity at the front entrances of over half the nuclear power plants in
the U.S.
Employers use hand-scan for entry/exit, recording staff movement and time/attendance
procedures.
Iris-scan technology has been piloted in ATM environments in England, the US,
Japan and Germany since as early as 1997.
Airports have begun to use iris-scanning for such diverse functions as employee
identification/verification for movement through secure areas and allowing registered frequent
airline passengers a system that enables fast and easy identity verification in order to expedite their
path through passport control.
Prison visitor systems, where visitors to inmates are subject to verification procedures in order that
identities may not be swapped during the visit - a familiar occurrence among prisons worldwide.
Border control. A notable example being the INSPASS trial in America where travelers were
issued with a card enabling them to use the strategically based biometric terminals and bypass
long immigration queues. There are other pilot systems operating in SE Asia and elsewhere in this
respect.
Other applications include monitoring prison transfers and releases, as well as projects designed
to authenticate on-line purchasing, on-line banking, on-line voting on-line stock trading ,gold and
diamond mines to name just a few. Iris-scan offers a high level of user security, privacy and general
peace of mind for the consumer.
FUTURE APPLICATIONS -SOME COMMON IDEAS:
There are many views concerning potential biometric applications, some popular examples being;
ATM machine use:
Workstation and network access:
Travel and tourism:
Internet transactions:
Telephone transactions:
Public identity cards:
DRAWBACKS OF BIOMETRICS:
Several countries, including Australia, Canada, the United States and New Zealand, have witnessed
public disquiet over identification schemes. Some of the fears that have been cited include:
• That people will be de-humanized by being reduced to codes
CONCLUSION:
So where security is highly required, implementation of biometrics security is a very good solution
as there is to fear of stealing or forgetting the password.Tomorrow will find ever-expanding applications
for this thoroughly time-tested technology for financial transactions, ticket-less travel, and new business
and residential applications where high security is a major concern.