Biometrics Technology

Read Complete Research Material



Biometrics Technology

Introduction

Biometric technology is definitely the future of security. A biometric system is able to recognize the physiological characteristics such as fingerprints, iris of the eye, tone of voice, facial features and much more. Biometric technology is divided into two different moments, the initial registration of somatic and physiological traits, such enrollment and recognition phase. The new border security and intrusion detection and alarm systems now will focus increasingly on biometric technology, leading to excellent results and great stability and security. Examples of features that can be measured include facial variations, fingerprints, hand geometry, handwriting, iris and retinal differences, and voice. Biometrics is indeed both a threat to the right to privacy of Constitution Fundamental Freedoms, and a means to protect it by strengthening the confidentiality of communications (Wayman, pp.35).

Biometrics and Individual Privacy

The biometric techniques allow the recognition of the identity of an individual by identifying characteristics of the human body. Technological developments now allow extensive use of biometrics while representing half often incompatible with the privacy of an individual. In fact, "raise" the individual parts of the human element of identification is equivalent to "sacrifice" sphere of privacy of an individual and give a very invasive profiling: for example the creation of databases containing fingerprints or iris images, which allow virtually unequivocal recognition (Rule, pp. 45). Biometrics is defined by the Guarantor for the privacy of a mixture of biology; electronics and genetics that turn the body into a password cannot be altered or reproduced.

To date, however, the object is of wide suspicion because of the appearance of predominantly intrusive. However, technical alterations can be avoided by the guaranteed recognition of the individual himself. In all probability, the problem will likely move to the protection capabilities of databases containing biometrics and related security measures is to avoid the risks of unlawful processing.

In terms of national legislation now, the reference point is the new Code concerning the protection of personal data, which should be read carefully and understood well if you intend to use biometrics to allow recognition of individuals (Bolle & Senior, pp.109). In fact, the code is essentially based on two principles to be applied to the processing of data: the necessity and proportionality of treatment modalities.

Biometrics and Effectiveness of Public Acceptance

The "biometrics" is a technology that enables a reading of the traits of each individual as a fingerprint, iris features, the physical patterns of the face or veins are used to design advanced security protocols. One of the most widely used biometric systems is the scanning of fingerprints. It is known by the name of Master-Slave and consists of a panel that is installed inside the house and a small device (fingerprint reader) placed at the door.

The biometric recognition technology is making the leap from science fiction to everyday applications used in offices. Our new handheld computer or personal digital assistant (PDA) is equipped with a biometric security system. Inside the iPAQ is a fingerprint scanner and the device which remains locked until the owner's fingerprint is ...
Related Ads
  • Biometrics
    www.researchomatic.com...

    New biometric technologies are being develope ...

  • Biometric Security
    www.researchomatic.com...

    Biometric Security , Biometric Security ...

  • System Security Technology
    www.researchomatic.com...

    This paper will discuss the recent history of finger ...

  • Case Study
    www.researchomatic.com...

    The use of biometric technology is incorporat ...

  • Biometric Id Card
    www.researchomatic.com...

    Furthermore, the use of biometric technology ...