Submit Articles A Collection of Informative and Interesting Articles  

How Biometric Security System is Serving the Humans

BY: David Prakash Kumar | Category: Issues | Submitted: 2010-07-01 00:01:06
       No Photo
Article Summary: "The Biometric security system is a method that uses the features of the person to prevent others trying to impersonate a person. Read all about this security system here..."

Share with Facebook Share with Linkedin Share with Twitter Share with Pinterest Email this article

Biometric Security is developed to identify human beings through their physical characteristics or from their behavior. For example the retinal scan, fingerprints patterns, hand geometry, iris scan, facial characteristics and hand written signature can be used for the recognition of a person. All these characters can vary from person to person. In this system we take the biological information of a human and then store this information in our database. This data base is then useful for the identification or verification of a person.

Biometric security technology stores the biological information of the people, it is typically more reliable for the identification of the people than other identification methods that are being used. Several different types of technologies are being used for the Biometric security systems.

Now a days, in airports, biometrics security systems are also being used. Before the biometric security system became common in airports, they were identifying the people through finger scanning, biographical data and names. The authorities were checking the names to verify if this person was involved in any terrorist activity or if this person was a criminal. Now we can identify a person through the finger scanning. By using the finger scanning technique we can also compare the identities of the traveler with those people who are in the blacklist. By using the biometric security system we are also catering to the other requirements such as ATM Security. Since airport security uses biometrics, now it is very difficult for anybody to claim another's identity even by duplicating or robbing the travel documents of other people.

The first method for the recognition of a person with this system is through facial recognition. Biometric security system identifies each person by analyzing the facial characteristics. These facial characters will differ from person to person. Facial characteristics include the length of the nose, distance between the eyes, angle of the jaw etc. Facial recognition works for both verification and identification of a person.

Secondly recognition can also perform through fingerprint recognition. This method is being used in all over the world for the biometric authentication of a person.

Hand geometry is also playing a vital role in biometrical security system. It is based on the recognition of a person through the analysis of the shape of his hands. However our hands are not descriptive enough for the identification of the people, unlike the fingerprints. These combine many features of an individual person, such as length of the fingers, height, distance between joints and width of the hands.

Voice recognition technology is also being used for the biometric security system. This technique is being used for the unique identification of the voice of a person. Biometric security system matches the pitch, tone, cadence etc for the recognition of a person. Biometric security system captures the individual's speech and then saves it in an electronic format for the recognition of a person through the voice.

Another process which is being used in biometric security system is Iris recognition. It is based on the analysis of a person's distinctly colored ring which surrounds the pupil of eye. There are more than 250 unique characters and these remain constant throughout the life of a person. Authorities are using this technology typically for access control into a facility. These are some common techniques that are being used in Biometric Security System.

About Author / Additional Info:

Comments on this article: (0 comments so far)

Comment Comment By Comment Date

Leave a Comment   |   Article Views: 2738

Additional Articles:
•   How to Choose a Contractor to Remodel Your Pool

•   Guild Wars 2 - Especially PvP | Gameplay, Weapons and Chain Skills

•   Brigade Lakefront, High End Apartments in Bangalore

•   Advice to Put Your Business Ahead

Latest Articles in "Issues" category:
•   Cheap Independence Anniversary, Sarcastically Speaking.

•   My Close Shave With Jezebel

•   First Ladyship: A Shadow of Democratic Misconception

•   The Language of the Paulicians and Pomaks

•   Brain Drain: Stealing the Great Minds of Africa's Demographic Giant

•   Holocaust Ignored is Holocaust Denied: Congo Holocaust?

•   Let us Give Them a Dream

Important Disclaimer: All articles on this website are for general information only and is not a professional or experts advice. We do not own any responsibility for correctness or authenticity of the information presented in this article, or any loss or injury resulting from it. We do not endorse these articles, we are neither affiliated with the authors of these articles nor responsible for their content. Please see our disclaimer section for complete terms.
Page copy protected against web site content infringement by Copyscape
Copyright © 2010 - Do not copy articles from this website.
| Home | Disclaimer | Xhtml |