Understanding Biometric Technology: Types And Applications

Psychological and Behavioral Biometrics

Biometric word consist of two word one is bio another is metric. Biometric simply measures the human behavior physically. This technology analyzes the biological information of the human being and uses it for surveillance purpose or for the access control. The verification process using the biometric is gaining huge popularity in the public security and in the commercial market as well. The biometric used in the daily basis by the human being like in the office attendance system, airport’s security checkpoints, and several ID cards use biometric databases as well in many countries.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Biometrics is of two types psychological and behavioral. The several parts of the psychological biometrics are face recognition, fingerprint sensor, hand, iris sensor, DNA and the behavioral are keystroke, signature, and voice recognition. These methods are used for collecting human information to implement the biometric authentication.

This technology takes finger print of a person and stores the features of the image like the arches, loop along with the edges, whorls, furrows and minutiae. CCD or the CMOS image sensors are used to capture the fingerprint. This technology adds another level of security to the modern devices and the services (Sousedik & Busch 2014). It is the most economical technology in the field of biometric it increases the security of the organization.

This is also one type of biometric application where the person can be identified by his digital image by analyzing and comparing the face pattern. Many security systems use this biometric application. 80 nodal points of the human face can be read by these biometric systems. This face recognition technique is used in many places like in the Facebook the face recognition is used for tagging people in the photographs by analyzing whose photograph is this. This technology enhances the physical security of the organization as the unauthorized person cannot have an access to the organization (Parmar & Mehta 2014).

Voice recognition is used to produce the voice patterns combining the psychological factor and the behavioral factors. The voice is captured by processing the technology of speech. Nasal tone, frequency, cadence and inflection are important for the voice processing (Nandish, Balaji & Shantala 2014). This technology has the high social acceptability and it is cheap too, so this can be used in the organizations to improve the physical security.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

It is one type of biometric method which is used to identify a person based on the iris. Colors of the iris differ for every person it can be noticed by close inspection. It is the most accurate biometric application right now. The iris scanners are becoming the essential application in the field of security. Camera, infrared and proper light is needed to collect the iris information (Galbally, Marcel & Fierrez 2014). These scanners calculate the pattern of the iris and translate the data into a code. Iris recognition mainly applied in the aviation industry for the security purpose. Iris technology is very useful in terms of the security measure. As the chances of error are less, it will provide more stable security to the organization.

References:

Galbally, J., Marcel, S., & Fierrez, J. (2014). Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE transactions on image processing, 23(2), 710-724.

Nandish, M. S., Balaji, M. C., & Shantala, C. P. (2014). An outdoor navigation with voice recognition security application for visually impaired people. International Journal of Engineering Trends and Technology, 10(10), 500-504.

Parmar, D. N., & Mehta, B. B. (2014). Face recognition methods & applications. arXiv preprint arXiv:1403.0485.

Sousedik, C., & Busch, C. (2014). Presentation attack detection methods for fingerprint recognition systems: a survey. Iet Biometrics, 3(4), 219-233.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.